Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Property inference attacks on fully connected neural networks using permutation invariant representations

K Ganju, Q Wang, W Yang, CA Gunter… - Proceedings of the 2018 …, 2018 - dl.acm.org
With the growing adoption of machine learning, sharing of learned models is becoming
popular. However, in addition to the prediction properties the model producer aims to share …

Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings

X **, K Pei, JY Won, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …

State of the art of network protocol reverse engineering tools

J Duchêne, C Le Guernic, E Alata, V Nicomette… - Journal of Computer …, 2018 - Springer
Communication protocols enable structured information exchanges between different
entities. A description, at different levels of detail, is necessary for many applications, such …

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers

G Ateniese, LV Mancini, A Spognardi… - … Journal of Security …, 2015 - inderscienceonline.com
Machine-learning (ML) enables computers to learn how to recognise patterns, make
unintended decisions, or react to a dynamic environment. The effectiveness of trained …

Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization

S Dinesh, N Burow, D Xu… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …

Difuze: Interface aware fuzzing for kernel drivers

J Corina, A Machiry, C Salls, Y Shoshitaishvili… - Proceedings of the …, 2017 - dl.acm.org
Device drivers are an essential part in modern Unix-like systems to handle operations on
physical devices, from hard disks and printers to digital cameras and Bluetooth speakers …

Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery

W You, X Wang, S Ma, J Huang… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Existing mutation based fuzzers tend to randomly mutate the input of a program without
understanding its underlying syntax and semantics. In this paper, we propose a novel on-the …

Virtuoso: Narrowing the semantic gap in virtual machine introspection

B Dolan-Gavitt, T Leek, M Zhivich… - 2011 IEEE symposium …, 2011 - ieeexplore.ieee.org
Introspection has featured prominently in many recent security solutions, such as virtual
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …

Where does it go? refining indirect-call targets with multi-layer type analysis

K Lu, H Hu - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …