Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterDecember 2024
Poster: Protecting Source Code Privacy When Hunting Bugs
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 5030–5032https://doi.org/10.1145/3658644.3691407When proving to a third party that a software system is of high quality or bug-free, a software vendor may have to reveal the source code such that the third party can use a public or their own static code analyzer to check the code. However, revealing ...
- research-articleDecember 2024
Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing
- Arvind S Raj,
- Wil Gibbs,
- Fangzhou Dong,
- Jayakrishna Menon Vadayath,
- Michael Tompkins,
- Steven Wirsz,
- Yibo Liu,
- Zhenghao Hu,
- Chang Zhu,
- Gokulkrishna Praveen Menon,
- Brendan Dolan-Gavitt,
- Adam Doupé,
- Ruoyu Wang,
- Yan Shoshitaishvili,
- Tiffany Bao
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3719–3733https://doi.org/10.1145/3658644.3690278The security landscape of software systems has witnessed considerable advancements through dynamic testing methodologies, especially fuzzing. Traditionally, fuzzing involves a sequential, cyclic process where software is tested to identify crashes. These ...
Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2786–2798https://doi.org/10.1145/3658644.3690244We present an approach to lift position-independent x86-64 binaries to symbolized NASM. Symbolization is a decompilation step that enables binary patching: functions can be modified, and instructions can be interspersed. Moreover, it is the first ...
- research-articleDecember 2024
B-Side: Binary-Level Static System Call Identification
MIDDLEWARE '24: Proceedings of the 25th International Middleware ConferencePages 225–237https://doi.org/10.1145/3652892.3700761System call filtering is widely used to secure programs in multi-tenant environments, and to sandbox applications in modern desktop software deployment and package management systems. Filtering rules are hard to write and maintain manually, hence ...
- research-articleOctober 2024
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 770–782https://doi.org/10.1145/3691620.3695070Binary code similarity detection(BCSD), as a fundamental technique in software security, has various applications, including malware family detection, known vulnerability detection and code plagiarism detection. Recent deep learning-based BCSD approaches ...
-
- research-articleJuly 2024
BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1200–1213https://doi.org/10.1145/3634737.3645006Binary reverse engineering is crucial to gaining insights into the inner workings of a stripped binary. Yet, it is challenging to read the original semantics from a binary code snippet because of the unavailability of high-level information in the source,...
- keynoteJune 2024
Malware Research: History, Milestones, and Open Questions
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 5–6https://doi.org/10.1145/3626232.3655997Since the emergence of the first self-replicating software viruses in the 1980s, the history of malware has undergone a rich and fascinating evolution. From curious adolescents experimenting with computers to cyber-criminal orchestrating large-scale ...
- research-articleApril 2024
What You Trace is What You Get: Dynamic Stack-Layout Recovery for Binary Recompilation
ASPLOS '24: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2Pages 1250–1263https://doi.org/10.1145/3620665.3640371Users of proprietary and/or legacy programs without vendor support are denied the significant advances in compiler technologies of the past decades. Adapting these technologies to operate directly on binaries without source code is often infeasible. ...
- research-articleApril 2024
Polynima: Practical Hybrid Recompilation for Multithreaded Binaries
EuroSys '24: Proceedings of the Nineteenth European Conference on Computer SystemsPages 1126–1141https://doi.org/10.1145/3627703.3650065The maintenance of software distributed in its binary form can become challenging over time, due to the lack of vendor support or obsolete build environments. This can be costly when dealing with critical security vulnerabilities that are difficult to ...
PPT4J: Patch Presence Test for Java Binaries
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 225, Pages 1–12https://doi.org/10.1145/3597503.3639231The number of vulnerabilities reported in open source software has increased substantially in recent years. Security patches provide the necessary measures to protect software from attacks and vulnerabilities. In practice, it is difficult to identify ...
- research-articleApril 2024
PS3: Precise Patch Presence Test based on Semantic Symbolic Signature
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 167, Pages 1–12https://doi.org/10.1145/3597503.3639134During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security patch in every affected binary is ...
- research-articleFebruary 2024
BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 7, Pages 1–13https://doi.org/10.1145/3597503.3623328Binary code similarity analysis (BCSA) is a fundamental building block for various software security, reverse engineering, and re-engineering applications. Existing research has applied deep neural networks (DNNs) to measure the similarity between binary ...
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications ConferencePages 677–690https://doi.org/10.1145/3627106.3627197Recently proposed tools such as LogicMem, Katana, and AutoProfile enable a fine-grained inspection of the operating system’s memory. They provide insights that were previously only available for Linux machines specifically instrumented for cooperation ...
- ArticleJanuary 2024
Pinky: A Modern Malware-Oriented Dynamic Information Retrieval Tool
Innovative Security Solutions for Information Technology and CommunicationsPages 65–78https://doi.org/10.1007/978-3-031-52947-4_6AbstractWe present here a reverse engineering tool that can be used for information retrieval and anti-malware techniques. Our main contribution is the design and implementation of an instrumentation framework aimed at providing insight on the emulation ...
- research-articleNovember 2023
SysPart: Automated Temporal System Call Filtering for Binaries
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1979–1993https://doi.org/10.1145/3576915.3623207Restricting the system calls available to applications reduces the attack surface of the kernel and limits the functionality available to compromised applications. Recent approaches automatically identify the system calls required by programs to block ...
- research-articleNovember 2023
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1362–1376https://doi.org/10.1145/3576915.3623090We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC-V) machine code of cryptographic protocols. We achieve this by first transpiling the binary of protocols into an intermediate representation and then ...
- research-articleOctober 2023
Black-box Attacks Against Neural Binary Function Detection
RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and DefensesPages 1–16https://doi.org/10.1145/3607199.3607200Binary analyses based on deep neural networks (DNNs), or neural binary analyses (NBAs), have become a hotly researched topic in recent years. DNNs have been wildly successful at pushing the performance and accuracy envelopes in the natural language and ...
- ArticleJanuary 2024
FSmell: Recognizing Inline Function in Binary Code
AbstractFunction recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still remains challenging. This is mainly due to two factors. Firstly, in binaries, there exist no ...
- research-articleJuly 2023
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityPages 259–273https://doi.org/10.1145/3579856.3595796Driven by application diversification and market needs, software systems are integrating new features rapidly. However, this “feature creep” can compromise software security, as more code carries the risk of more vulnerabilities. This paper presents a ...
- research-articleJuly 2023
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityPages 247–258https://doi.org/10.1145/3579856.3582814In the past years, the CWE-190 integer overflow led to many vulnerabilities. Program verification techniques such as Abstract Interpretation can show that no such bug is present in a given program. To date, such techniques often aim to verify the ...