Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

J Vadayath, M Eckert, K Zeng, N Weideman… - 31st USENIX Security …, 2022 - usenix.org
In spite of their effectiveness in the context of vulnerability discovery, current state-of-the-art
binary program analysis approaches are limited by inherent trade-offs between accuracy …

[PDF][PDF] Analysis and defense of vulnerabilities in binary code

D Brumley - CARNEGIE-MELLON UNIV …, 2008 - reports-archive.adm.cs.cmu.edu
In this thesis, we develop techniques for vulnerability analysis and defense that only require
access to vulnerable programs in binary form. Our approach does not use or require source …

Patch based vulnerability matching for binary programs

Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The binary-level function matching has been widely used to detect whether there are 1-day
vulnerabilities in released programs. However, the high false positive is a challenge for …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

BVDetector: A program slice-based binary code vulnerability intelligent detection system

J Tian, W Xing, Z Li - Information and Software Technology, 2020 - Elsevier
Context Software vulnerability detection is essential to ensure cybersecurity. Currently, most
software is published in binary form, thus researchers can only detect vulnerabilities in these …

[HTML][HTML] Survey of techniques to detect common weaknesses in program binaries

A Adhikari, P Kulkarni - Cyber Security and Applications, 2025 - Elsevier
Software vulnerabilities resulting from coding weaknesses and poor development practices
are common. Attackers can exploit these vulnerabilities and impact the security and privacy …

The Convergence of Source Code and Binary Vulnerability Discovery--A Case Study

A Mantovani, L Compagna, Y Shoshitaishvili… - Proceedings of the …, 2022 - dl.acm.org
Decompilers are tools designed to recover a high-level language representation (typically in
C code) from program binaries. Over the past five years, decompilers have improved …

Tracer: Signature-based static analysis for detecting recurring vulnerabilities

W Kang, B Son, K Heo - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Similar software vulnerabilities recur because developers reuse existing vulnerable code, or
make similar mistakes when implementing the same logic. Recently, various analysis …

Loop-extended symbolic execution on binary programs

P Saxena, P Poosankam, S McCamant… - Proceedings of the …, 2009 - dl.acm.org
Mixed concrete and symbolic execution is an important technique for finding and
understanding software bugs, including security-relevant ones. However, existing symbolic …

Locating vulnerabilities in binaries via memory layout recovering

H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin… - Proceedings of the 2019 …, 2019 - dl.acm.org
Locating vulnerabilities is an important task for security auditing, exploit writing, and code
hardening. However, it is challenging to locate vulnerabilities in binary code, because most …