Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization

S Dinesh, N Burow, D Xu… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …

Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing

S Nagy, M Hicks - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Coverage-guided fuzzing is one of the most successful approaches for discovering software
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …

Egalito: Layout-agnostic binary recompilation

D Williams-King, H Kobayashi… - Proceedings of the …, 2020 - dl.acm.org
For comprehensive analysis of all executable code, and fast turn-around time for
transformations, it is essential to operate directly on binaries to enable profiling, security …

Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask

C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …

{RAZOR}: A framework for post-deployment software debloating

C Qian, H Hu, M Alharthi, PH Chung, T Kim… - 28th USENIX security …, 2019 - usenix.org
Commodity software typically includes functionalities for a broad user population. However,
each individual user usually only needs a subset of the supported functionalities. The …

[PDF][PDF] Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.

E Bauman, Z Lin, KW Hamlen - NDSS, 2018 - ndss-symposium.org
Static binary rewriting is a core technology for many systems and security applications,
including profiling, optimization, and software fault isolation. While many static binary …

Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing

S Nagy, A Nguyen-Tuong, JD Hiser… - 30th USENIX Security …, 2021 - usenix.org
Coverage-guided fuzzing is one of the most effective software security testing techniques.
Fuzzing takes on one of two forms: compiler-based or binary-only, depending on the …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …