Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …
software. Over the past few decades, research in binary disassembly has produced many …
Studying and understanding the tradeoffs between generality and reduction in software debloating
Existing approaches for program debloating often use a usage profile, typically provided as
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …
{AnimateDead}: Debloating web applications using concolic execution
Year over year, modern web applications evolve to cater to the needs of many users and
support various runtime environments. The ever-growing need to appeal to as many users …
support various runtime environments. The ever-growing need to appeal to as many users …
One size does not fit all: security hardening of mips embedded systems via static binary debloating for shared libraries
Embedded systems have become prominent targets for cyberattacks. To exploit firmware's
memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the …
memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the …
C to Checked C by 3C
Owing to the continued use of C (and C++), spatial safety violations (eg, buffer overflows)
still constitute one of today's most dangerous and prevalent security vulnerabilities. To …
still constitute one of today's most dangerous and prevalent security vulnerabilities. To …
Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly
We present an approach to lift position-independent x86-64 binaries to symbolized NASM.
Symbolization is a decompilation step that enables binary patching: functions can be …
Symbolization is a decompilation step that enables binary patching: functions can be …
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
In today's era of the Internet of Things, we are surrounded by security-and safety-critical,
network-connected devices. In parallel with the rise in attacks on such devices, we have also …
network-connected devices. In parallel with the rise in attacks on such devices, we have also …
A broad comparative evaluation of software debloating tools
MD Brown, A Meily, B Fairservice, A Sood… - 33rd USENIX Security …, 2024 - usenix.org
Software debloating tools seek to improve program security and performance by removing
unnecessary code, called bloat. While many techniques have been proposed, several …
unnecessary code, called bloat. While many techniques have been proposed, several …
Minimalist: Semi-automated Debloating of {PHP} Web Applications through Static Analysis
As web applications grow more complicated and rely on third-party libraries to deliver new
features to their users, they become bloated with unnecessary code. This unnecessary code …
features to their users, they become bloated with unnecessary code. This unnecessary code …
Palantír: Optimizing attack provenance with hardware-enhanced system observability
System auditing is the foundation of attack provenance to investigate root causes and
ramifications of cyber-attacks. However, provenance tracking on coarse-grained audit logs …
ramifications of cyber-attacks. However, provenance tracking on coarse-grained audit logs …