Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Codee: A tensor embedding scheme for binary code search

J Yang, C Fu, XY Liu, H Yin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Given a target binary function, the binary code search retrieves top-K similar functions in the
repository, and similar functions represent that they are compiled from the same source …

Apícula: Static detection of API calls in generic streams of bytes

M D'Onghia, M Salvadore, BM Nespoli, M Carminati… - Computers & …, 2022 - Elsevier
API functions often require the crafting of specific inputs and may return some output that is
usually processed by the code that immediately follows their invocation. In this work, we …

A natural language processing approach for instruction set architecture identification

D Sahabandu, JS Mertoguno… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Binary analysis of software is a critical step in cyber forensics applications such as program
vulnerability assessment and malware detection. This involves interpreting instructions …

ISAdetect: Usable automated detection of CPU architecture and endianness for executable binary files and object code

S Kairajärvi, A Costin, T Hämäläinen - … of the Tenth ACM Conference on …, 2020 - dl.acm.org
Static and dynamic binary analysis techniques are actively used to reverse engineer
software's behavior and to detect its vulnerabilities, even when only the binary code is …

[HTML][HTML] Bino: Automatic recognition of inline binary functions from template classes

L Binosi, M Polino, M Carminati, S Zanero - Computers & Security, 2023 - Elsevier
In this paper, we propose BINO, a static analysis approach that relieves reverse engineers
from the challenging task of recognizing library functions that have been inlined. BINO …

TaiE: Function Identification for Monolithic Firmware

J Huang, K Yang, G Wang, Z Shi, S Lv… - Proceedings of the 32nd …, 2024 - dl.acm.org
The principal tasks of program analysis, including bug searching and code similarity
detection, are executed at the function level. However, the accurate identification of functions …

The good, the bad, and the binary: An lstm-based method for section boundary detection in firmware analysis

R Remigio, A Bertani, M Polino, M Carminati… - … Workshop on Security, 2023 - Springer
Static analysis tools need information about the ISA and the boundaries of the code and
data sections of the binary they analyze. This information is often not readily available in …

Do you Trust your Device? Open Challenges in IoT Security Analysis

L Binosi, P Mazzini, A Sanna, M Carminati… - … Conference on Security …, 2024 - iris.unica.it
Several critical contexts, such as healthcare, smart cities, drones, transportation, and
agriculture, nowadays rely on IoT, or more in general embedded, devices that require …

[KNYGA][B] A game-theoretic framework for detecting advanced persistent threats

D Sahabandu - 2023 - search.proquest.com
Abstract Advanced Persistent Threats (APTs) are stealthy and long-term attacks on cyber
systems that threaten the security and privacy of sensitive information. The interactions of …