A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Lemna: Explaining deep learning based security applications

W Guo, D Mu, J Xu, P Su, G Wang, X **ng - proceedings of the 2018 …, 2018 - dl.acm.org
While deep learning has shown a great potential in various domains, the lack of
transparency has limited its application in security or safety-critical areas. Existing research …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

Code obfuscation against symbolic execution attacks

S Banescu, C Collberg, V Ganesh… - Proceedings of the …, 2016 - dl.acm.org
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …

AMAL: high-fidelity, behavior-based automated malware analysis and classification

A Mohaisen, O Alrawi, M Mohaisen - computers & security, 2015 - Elsevier
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …

Classifying malware represented as control flow graphs using deep graph convolutional neural network

J Yan, G Yan, D ** - 2019 49th annual IEEE/IFIP international …, 2019 - ieeexplore.ieee.org
Malware have been one of the biggest cyber threats in the digital world for a long time.
Existing machine learning based malware classification methods rely on handcrafted …

Bitshred: feature hashing malware for scalable triage and semantic analysis

J Jang, D Brumley, S Venkataraman - … of the 18th ACM conference on …, 2011 - dl.acm.org
The sheer volume of new malware found each day is growing at an exponential pace. This
growth has created a need for automatic malware triage techniques that determine what …

A generic approach to automatic deobfuscation of executable code

B Yadegari, B Johannesmeyer… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Malicious software are usually obfuscated to avoid detection and resist analysis. When new
malware is encountered, such obfuscations have to be penetrated or removed (" …