Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask

C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021‏ - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …

Datalog disassembly

A Flores-Montoya, E Schulte - 29th USENIX Security Symposium …, 2020‏ - usenix.org
Disassembly is fundamental to binary analysis and rewriting. We present a novel
disassembly technique that takes a stripped binary and produces reassembleable assembly …

Fineibt: Fine-grain control-flow enforcement with indirect branch tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023‏ - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …

Using logic programming to recover c++ classes and methods from compiled executables

EJ Schwartz, CF Cohen, M Duggan, J Gennari… - Proceedings of the …, 2018‏ - dl.acm.org
High-level C++ source code abstractions such as classes and methods greatly assist human
analysts and automated algorithms alike when analyzing C++ programs. Unfortunately …

cfi: Type-assisted control flow integrity for x86-64 binaries

P Muntean, M Fischer, G Tan, Z Lin… - … on Research in Attacks …, 2018‏ - Springer
Programs aiming for low runtime overhead and high availability draw on several object-
oriented features available in the C/C++ programming language, such as dynamic object …

[PDF][PDF] CFInsight: A Comprehensive Metric for CFI Policies.

T Frassetto, P Jauernig, D Koisser, AR Sadeghi - NDSS, 2022‏ - tommaso.frassetto.science
Software vulnerabilities are one of the major threats to computer security and have caused
substantial damage over the past decades. Consequently, numerous techniques have been …

Towards optimal use of exception handling information for function detection

C Pang, R Yu, D Xu, E Koskinen… - 2021 51st Annual …, 2021‏ - ieeexplore.ieee.org
Function entry detection is critical for security of binary code. Conventional methods heavily
rely on patterns, inevitably missing true functions and introducing errors. Recently, call …

Analyzing control flow integrity with LLVM-CFI

P Muntean, M Neumayer, Z Lin, G Tan… - Proceedings of the 35th …, 2019‏ - dl.acm.org
Control-flow hijacking attacks are used to perform malicious computations. Current solutions
for assessing the attack surface after a control flow integrity (CFI) policy was applied can …

Detecting return-oriented programming on firmware-only embedded devices using hardware performance counters

A Omotosho, GB Welearegai, C Hammer - Proceedings of the 37th ACM …, 2022‏ - dl.acm.org
Return-oriented programming (ROP) relies on in-memory code sequences ending in return
instructions to chain together arbitrary malware. ROP is one of the most dangerous security …

BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer

W Li, H Wen, Z Lin - Proceedings of the 2024 on ACM SIGSAC …, 2024‏ - dl.acm.org
In modern mobile devices, baseband is an integral component running on top of cellular
processors to handle crucial radio communications. However, recent research reveals …