D Brumley - CARNEGIE-MELLON UNIV …, 2008 - reports-archive.adm.cs.cmu.edu
In this thesis, we develop techniques for vulnerability analysis and defense that only require access to vulnerable programs in binary form. Our approach does not use or require source …
The binary-level function matching has been widely used to detect whether there are 1-day vulnerabilities in released programs. However, the high false positive is a challenge for …
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high- level, semantically rich information about data structures and control constructs makes the …
J Tian, W Xing, Z Li - Information and Software Technology, 2020 - Elsevier
Context Software vulnerability detection is essential to ensure cybersecurity. Currently, most software is published in binary form, thus researchers can only detect vulnerabilities in these …
A Adhikari, P Kulkarni - Cyber Security and Applications, 2025 - Elsevier
Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy …
Decompilers are tools designed to recover a high-level language representation (typically in C code) from program binaries. Over the past five years, decompilers have improved …
W Kang, B Son, K Heo - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Similar software vulnerabilities recur because developers reuse existing vulnerable code, or make similar mistakes when implementing the same logic. Recently, various analysis …
Mixed concrete and symbolic execution is an important technique for finding and understanding software bugs, including security-relevant ones. However, existing symbolic …
Locating vulnerabilities is an important task for security auditing, exploit writing, and code hardening. However, it is challenging to locate vulnerabilities in binary code, because most …