Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Property inference attacks on fully connected neural networks using permutation invariant representations
With the growing adoption of machine learning, sharing of learned models is becoming
popular. However, in addition to the prediction properties the model producer aims to share …
popular. However, in addition to the prediction properties the model producer aims to share …
Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …
it requires summarizing the execution behavior and semantics of the function in human …
State of the art of network protocol reverse engineering tools
Communication protocols enable structured information exchanges between different
entities. A description, at different levels of detail, is necessary for many applications, such …
entities. A description, at different levels of detail, is necessary for many applications, such …
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
Machine-learning (ML) enables computers to learn how to recognise patterns, make
unintended decisions, or react to a dynamic environment. The effectiveness of trained …
unintended decisions, or react to a dynamic environment. The effectiveness of trained …
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …
even developers who rely on third-party libraries. Such analysis relies on automatic …
Difuze: Interface aware fuzzing for kernel drivers
Device drivers are an essential part in modern Unix-like systems to handle operations on
physical devices, from hard disks and printers to digital cameras and Bluetooth speakers …
physical devices, from hard disks and printers to digital cameras and Bluetooth speakers …
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
Existing mutation based fuzzers tend to randomly mutate the input of a program without
understanding its underlying syntax and semantics. In this paper, we propose a novel on-the …
understanding its underlying syntax and semantics. In this paper, we propose a novel on-the …
Virtuoso: Narrowing the semantic gap in virtual machine introspection
Introspection has featured prominently in many recent security solutions, such as virtual
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …
Where does it go? refining indirect-call targets with multi-layer type analysis
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …
However, indirect-calls also bring challenges to constructing a precise control-flow graph …