作者
Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin Vechev
发表日期
2018/10/15
图书
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
页码范围
1667-1680
简介
We present a novel approach for predicting debug information in stripped binaries. Using machine learning, we first train probabilistic models on thousands of non-stripped binaries and then use these models to predict properties of meaningful elements in unseen stripped binaries. Our focus is on recovering symbol names, types and locations, which are critical source-level information wiped off during compilation and stripping. Our learning approach is able to distinguish and extract key elements such as register-allocated and memory-allocated variables usually not evident in the stripped binary. To predict names and types of extracted elements, we use scalable structured prediction algorithms in probabilistic graphical models with an extensive set of features which capture key characteristics of binary code. Based on this approach, we implemented an automated tool, called Debin, which handles ELF binaries on …
引用总数
201920202021202220232024131431213418
学术搜索中的文章
J He, P Ivanov, P Tsankov, V Raychev, M Vechev - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018