Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …
software. Over the past few decades, research in binary disassembly has produced many …
Datalog disassembly
Disassembly is fundamental to binary analysis and rewriting. We present a novel
disassembly technique that takes a stripped binary and produces reassembleable assembly …
disassembly technique that takes a stripped binary and produces reassembleable assembly …
Fineibt: Fine-grain control-flow enforcement with indirect branch tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
Using logic programming to recover c++ classes and methods from compiled executables
High-level C++ source code abstractions such as classes and methods greatly assist human
analysts and automated algorithms alike when analyzing C++ programs. Unfortunately …
analysts and automated algorithms alike when analyzing C++ programs. Unfortunately …
cfi: Type-assisted control flow integrity for x86-64 binaries
Programs aiming for low runtime overhead and high availability draw on several object-
oriented features available in the C/C++ programming language, such as dynamic object …
oriented features available in the C/C++ programming language, such as dynamic object …
[PDF][PDF] CFInsight: A Comprehensive Metric for CFI Policies.
Software vulnerabilities are one of the major threats to computer security and have caused
substantial damage over the past decades. Consequently, numerous techniques have been …
substantial damage over the past decades. Consequently, numerous techniques have been …
Towards optimal use of exception handling information for function detection
Function entry detection is critical for security of binary code. Conventional methods heavily
rely on patterns, inevitably missing true functions and introducing errors. Recently, call …
rely on patterns, inevitably missing true functions and introducing errors. Recently, call …
Analyzing control flow integrity with LLVM-CFI
Control-flow hijacking attacks are used to perform malicious computations. Current solutions
for assessing the attack surface after a control flow integrity (CFI) policy was applied can …
for assessing the attack surface after a control flow integrity (CFI) policy was applied can …
Detecting return-oriented programming on firmware-only embedded devices using hardware performance counters
Return-oriented programming (ROP) relies on in-memory code sequences ending in return
instructions to chain together arbitrary malware. ROP is one of the most dangerous security …
instructions to chain together arbitrary malware. ROP is one of the most dangerous security …
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer
In modern mobile devices, baseband is an integral component running on top of cellular
processors to handle crucial radio communications. However, recent research reveals …
processors to handle crucial radio communications. However, recent research reveals …