A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Lemna: Explaining deep learning based security applications
While deep learning has shown a great potential in various domains, the lack of
transparency has limited its application in security or safety-critical areas. Existing research …
transparency has limited its application in security or safety-critical areas. Existing research …
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …
techniques in security analyses. Example applications of dynamic taint analysis and forward …
Automatic analysis of malware behavior using machine learning
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …
systems. The amount and diversity of its variants render classic security defenses ineffective …
Code obfuscation against symbolic execution attacks
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …
malware writers to hamper program analysis. However, there seems to be little work on …
AMAL: high-fidelity, behavior-based automated malware analysis and classification
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
Classifying malware represented as control flow graphs using deep graph convolutional neural network
Malware have been one of the biggest cyber threats in the digital world for a long time.
Existing machine learning based malware classification methods rely on handcrafted …
Existing machine learning based malware classification methods rely on handcrafted …
Bitshred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This
growth has created a need for automatic malware triage techniques that determine what …
growth has created a need for automatic malware triage techniques that determine what …
A generic approach to automatic deobfuscation of executable code
Malicious software are usually obfuscated to avoid detection and resist analysis. When new
malware is encountered, such obfuscations have to be penetrated or removed (" …
malware is encountered, such obfuscations have to be penetrated or removed (" …