Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

[PDF][PDF] What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.

M Muench, J Stijohann, F Kargl, A Francillon… - NDSS, 2018 - wcventure.github.io
As networked embedded systems are becoming more ubiquitous, their security is becoming
critical to our daily life. While manual or automated large scale analysis of those systems …

[PDF][PDF] AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.

J Zaddach, L Bruno, A Francillon, D Balzarotti - NDSS, 2014 - researchgate.net
To address the growing concerns about the security of embedded systems, it is important to
perform accurate analysis of firmware binaries, even when the source code or the hardware …

Practical context-sensitive CFI

V Van der Veen, D Andriesse, E Göktaş… - Proceedings of the …, 2015 - dl.acm.org
Current Control-Flow Integrity (CFI) implementations track control edges individually,
insensitive to the context of preceding edges. Recent work demonstrates that this leaves …

HelDroid: Dissecting and Detecting Mobile Ransomware

N Andronio, S Zanero, F Maggi - … in Attacks, Intrusions, and Defenses: 18th …, 2015 - Springer
In ransomware attacks, the actual target is the human, as opposed to the classic attacks that
abuse the infected devices (eg, botnet renting, information stealing). Mobile devices are by …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

AMAL: high-fidelity, behavior-based automated malware analysis and classification

A Mohaisen, O Alrawi, M Mohaisen - computers & security, 2015 - Elsevier
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …

{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution

D Davidson, B Moench, T Ristenpart… - 22nd USENIX Security …, 2013 - usenix.org
Embedded systems increasingly use software-driven low-power microprocessors for
security-critical settings, surfacing a need for tools that can audit the security of the software …

Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery

W You, X Wang, S Ma, J Huang… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Existing mutation based fuzzers tend to randomly mutate the input of a program without
understanding its underlying syntax and semantics. In this paper, we propose a novel on-the …