Challenges in firmware re-hosting, emulation, and analysis
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …
various security and performance related questions, such as determining whether a …
From hack to elaborate technique—a survey on binary rewriting
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …
even developers who rely on third-party libraries. Such analysis relies on automatic …
Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing
Coverage-guided fuzzing is one of the most successful approaches for discovering software
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …
Egalito: Layout-agnostic binary recompilation
D Williams-King, H Kobayashi… - Proceedings of the …, 2020 - dl.acm.org
For comprehensive analysis of all executable code, and fast turn-around time for
transformations, it is essential to operate directly on binaries to enable profiling, security …
transformations, it is essential to operate directly on binaries to enable profiling, security …
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …
software. Over the past few decades, research in binary disassembly has produced many …
{RAZOR}: A framework for post-deployment software debloating
Commodity software typically includes functionalities for a broad user population. However,
each individual user usually only needs a subset of the supported functionalities. The …
each individual user usually only needs a subset of the supported functionalities. The …
[PDF][PDF] Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Static binary rewriting is a core technology for many systems and security applications,
including profiling, optimization, and software fault isolation. While many static binary …
including profiling, optimization, and software fault isolation. While many static binary …
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing
Coverage-guided fuzzing is one of the most effective software security testing techniques.
Fuzzing takes on one of two forms: compiler-based or binary-only, depending on the …
Fuzzing takes on one of two forms: compiler-based or binary-only, depending on the …
Sok: Enabling security analyses of embedded systems via rehosting
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …
developers and analysts to observe, and ultimately understand, how it works. This kind of …