Binary code is not easy

X Meng, BP Miller - Proceedings of the 25th International Symposium on …, 2016 - dl.acm.org
Binary code analysis is an enabling technique for many applications. Modern compilers and
run-time libraries have introduced significant complexities to binary code, which negatively …

Binslayer: accurate comparison of binary executables

M Bourquin, A King, E Robbins - Proceedings of the 2nd ACM SIGPLAN …, 2013 - dl.acm.org
As the volume of malware inexorably rises, comparison of binary code is of increasing
importance to security analysts as a method of automatically classifying new malware …

A survey of hardware-based control flow integrity (CFI)

R De Clercq, I Verbauwhede - ar** instructions
G Bonfante, J Fernandez, JY Marion, B Rouxel… - Proceedings of the …, 2015 - dl.acm.org
Fighting malware involves analyzing large numbers of suspicious binary files. In this context,
disassembly is a crucial task in malware analysis and reverse engineering. It involves the …

Binsec: Binary code analysis with low-level regions

A Djoudi, S Bardin - International Conference on Tools and Algorithms for …, 2015 - Springer
This article presents the open source BinSec platform for (formal) binary-level code analysis.
The platform is based on an extension of the DBA Intermediate Representation, and it is …

Formally verified lifting of c-compiled x86-64 binaries

F Verbeek, J Bockenek, Z Fu, B Ravindran - Proceedings of the 43rd …, 2022 - dl.acm.org
Lifting binaries to a higher-level representation is an essential step for decompilation, binary
verification, patching and security analysis. In this paper, we present the first approach to …

Saturn-software deobfuscation framework based on llvm

P Garba, M Favaro - Proceedings of the 3rd ACM Workshop on Software …, 2019 - dl.acm.org
The strength of obfuscated software has increased over the recent years. Compiler based
obfuscation has become the de facto standard in the industry and recent papers also show …

Optimistic hybrid analysis: Accelerating dynamic analysis through predicated static analysis

D Devecsery, PM Chen, J Flinn… - Proceedings of the …, 2018 - dl.acm.org
Dynamic analysis tools, such as those that detect data-races, verify memory safety, and
identify information flow, have become a vital part of testing and debugging complex …

Get rid of inline assembly through verification-oriented lifting

F Recoules, S Bardin, R Bonichon… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Formal methods for software development have made great strides in the last two decades,
to the point that their application in safety-critical embedded software is an undeniable …