[PDF][PDF] Degpt: Optimizing decompiler output with llm
Reverse engineering is essential in malware analysis, vulnerability discovery, etc.
Decompilers assist the reverse engineers by lifting the assembly to the high-level …
Decompilers assist the reverse engineers by lifting the assembly to the high-level …
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Towards Smart Contract Fuzzing on GPUs
Fuzzing is one of the major techniques for uncovering vulnerabilities in smart contracts. The
effectiveness of fuzzing is significantly affected by its throughput but unfortunately existing …
effectiveness of fuzzing is significantly affected by its throughput but unfortunately existing …
Fineibt: Fine-grain control-flow enforcement with indirect branch tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
Plankton: Reconciling binary code and debug information
Static analysis has been widely used in large-scale software defect detection. Despite recent
advances, it is still not practical enough because it requires compilation interference to …
advances, it is still not practical enough because it requires compilation interference to …
Sok: Demystifying binary lifters through the lens of downstream applications
Binary lifters convert executables into an intermediate representation (IR) of a compiler
framework. The recovered IR code is generally deemed “analysis friendly,” bridging low …
framework. The recovered IR code is generally deemed “analysis friendly,” bridging low …
Hiding in plain sight: An empirical study of web application abuse in malware
Web applications provide a wide array of utilities that are abused by malware as a
replacement for traditional attacker-controlled servers. Thwarting these Web App-Engaged …
replacement for traditional attacker-controlled servers. Thwarting these Web App-Engaged …
One size does not fit all: security hardening of mips embedded systems via static binary debloating for shared libraries
Embedded systems have become prominent targets for cyberattacks. To exploit firmware's
memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the …
memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the …
Callee: Recovering call graphs for binaries with transfer and contrastive learning
Recovering binary programs' call graphs is crucial for inter-procedural analysis tasks and
applications based on them. One of the core challenges is recognizing targets of indirect …
applications based on them. One of the core challenges is recognizing targets of indirect …
Position paper: On advancing adversarial malware generation using dynamic features
Along the evolution of malware detection systems, adversaries develop sophisticated
evasion techniques that render malicious samples undetectable. Especially for ML-based …
evasion techniques that render malicious samples undetectable. Especially for ML-based …