Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
From hack to elaborate technique—a survey on binary rewriting
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …
[PDF][PDF] What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
As networked embedded systems are becoming more ubiquitous, their security is becoming
critical to our daily life. While manual or automated large scale analysis of those systems …
critical to our daily life. While manual or automated large scale analysis of those systems …
[PDF][PDF] AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
To address the growing concerns about the security of embedded systems, it is important to
perform accurate analysis of firmware binaries, even when the source code or the hardware …
perform accurate analysis of firmware binaries, even when the source code or the hardware …
Practical context-sensitive CFI
Current Control-Flow Integrity (CFI) implementations track control edges individually,
insensitive to the context of preceding edges. Recent work demonstrates that this leaves …
insensitive to the context of preceding edges. Recent work demonstrates that this leaves …
HelDroid: Dissecting and Detecting Mobile Ransomware
In ransomware attacks, the actual target is the human, as opposed to the classic attacks that
abuse the infected devices (eg, botnet renting, information stealing). Mobile devices are by …
abuse the infected devices (eg, botnet renting, information stealing). Mobile devices are by …
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
AMAL: high-fidelity, behavior-based automated malware analysis and classification
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution
Embedded systems increasingly use software-driven low-power microprocessors for
security-critical settings, surfacing a need for tools that can audit the security of the software …
security-critical settings, surfacing a need for tools that can audit the security of the software …
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
Existing mutation based fuzzers tend to randomly mutate the input of a program without
understanding its underlying syntax and semantics. In this paper, we propose a novel on-the …
understanding its underlying syntax and semantics. In this paper, we propose a novel on-the …