[PDF][PDF] Degpt: Optimizing decompiler output with llm

P Hu, R Liang, K Chen - Proceedings 2024 Network and …, 2024‏ - ndss-symposium.org
Reverse engineering is essential in malware analysis, vulnerability discovery, etc.
Decompilers assist the reverse engineers by lifting the assembly to the high-level …

Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024‏ - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Towards Smart Contract Fuzzing on GPUs

W Chen, X Luo, H Cai, H Wang - 2024 IEEE Symposium on …, 2024‏ - ieeexplore.ieee.org
Fuzzing is one of the major techniques for uncovering vulnerabilities in smart contracts. The
effectiveness of fuzzing is significantly affected by its throughput but unfortunately existing …

Fineibt: Fine-grain control-flow enforcement with indirect branch tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023‏ - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …

Plankton: Reconciling binary code and debug information

A Zhou, C Ye, H Huang, Y Cai, C Zhang - Proceedings of the 29th ACM …, 2024‏ - dl.acm.org
Static analysis has been widely used in large-scale software defect detection. Despite recent
advances, it is still not practical enough because it requires compilation interference to …

Sok: Demystifying binary lifters through the lens of downstream applications

Z Liu, Y Yuan, S Wang, Y Bao - 2022 IEEE Symposium on …, 2022‏ - ieeexplore.ieee.org
Binary lifters convert executables into an intermediate representation (IR) of a compiler
framework. The recovered IR code is generally deemed “analysis friendly,” bridging low …

Hiding in plain sight: An empirical study of web application abuse in malware

M Yao, J Fuller, RP Kasturi, S Agarwal… - 32nd USENIX Security …, 2023‏ - usenix.org
Web applications provide a wide array of utilities that are abused by malware as a
replacement for traditional attacker-controlled servers. Thwarting these Web App-Engaged …

One size does not fit all: security hardening of mips embedded systems via static binary debloating for shared libraries

H Zhang, M Ren, Y Lei, J Ming - Proceedings of the 27th ACM …, 2022‏ - dl.acm.org
Embedded systems have become prominent targets for cyberattacks. To exploit firmware's
memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the …

Callee: Recovering call graphs for binaries with transfer and contrastive learning

W Zhu, Z Feng, Z Zhang, J Chen, Z Ou… - … IEEE Symposium on …, 2023‏ - ieeexplore.ieee.org
Recovering binary programs' call graphs is crucial for inter-procedural analysis tasks and
applications based on them. One of the core challenges is recognizing targets of indirect …

Position paper: On advancing adversarial malware generation using dynamic features

A Shafiei, V Rimmer, I Tsingenopoulos… - Proceedings of the 1st …, 2022‏ - dl.acm.org
Along the evolution of malware detection systems, adversaries develop sophisticated
evasion techniques that render malicious samples undetectable. Especially for ML-based …