Binary code is not easy
Binary code analysis is an enabling technique for many applications. Modern compilers and
run-time libraries have introduced significant complexities to binary code, which negatively …
run-time libraries have introduced significant complexities to binary code, which negatively …
Binslayer: accurate comparison of binary executables
M Bourquin, A King, E Robbins - Proceedings of the 2nd ACM SIGPLAN …, 2013 - dl.acm.org
As the volume of malware inexorably rises, comparison of binary code is of increasing
importance to security analysts as a method of automatically classifying new malware …
importance to security analysts as a method of automatically classifying new malware …
A survey of hardware-based control flow integrity (CFI)
R De Clercq, I Verbauwhede - ar** instructions
Fighting malware involves analyzing large numbers of suspicious binary files. In this context,
disassembly is a crucial task in malware analysis and reverse engineering. It involves the …
disassembly is a crucial task in malware analysis and reverse engineering. It involves the …
Binsec: Binary code analysis with low-level regions
A Djoudi, S Bardin - International Conference on Tools and Algorithms for …, 2015 - Springer
This article presents the open source BinSec platform for (formal) binary-level code analysis.
The platform is based on an extension of the DBA Intermediate Representation, and it is …
The platform is based on an extension of the DBA Intermediate Representation, and it is …
Formally verified lifting of c-compiled x86-64 binaries
Lifting binaries to a higher-level representation is an essential step for decompilation, binary
verification, patching and security analysis. In this paper, we present the first approach to …
verification, patching and security analysis. In this paper, we present the first approach to …
Saturn-software deobfuscation framework based on llvm
P Garba, M Favaro - Proceedings of the 3rd ACM Workshop on Software …, 2019 - dl.acm.org
The strength of obfuscated software has increased over the recent years. Compiler based
obfuscation has become the de facto standard in the industry and recent papers also show …
obfuscation has become the de facto standard in the industry and recent papers also show …
Optimistic hybrid analysis: Accelerating dynamic analysis through predicated static analysis
Dynamic analysis tools, such as those that detect data-races, verify memory safety, and
identify information flow, have become a vital part of testing and debugging complex …
identify information flow, have become a vital part of testing and debugging complex …
Get rid of inline assembly through verification-oriented lifting
Formal methods for software development have made great strides in the last two decades,
to the point that their application in safety-critical embedded software is an undeniable …
to the point that their application in safety-critical embedded software is an undeniable …