Locating vulnerabilities in binaries via memory layout recovering

H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin… - Proceedings of the 2019 …, 2019 - dl.acm.org
Locating vulnerabilities is an important task for security auditing, exploit writing, and code
hardening. However, it is challenging to locate vulnerabilities in binary code, because most …

Locating vulnerability in binaries using deep neural networks

R Li, C Zhang, C Feng, X Zhang, C Tang - Ieee Access, 2019 - ieeexplore.ieee.org
Binary fault localization is important for vulnerability analysis, but many current techniques
face problems in locating vulnerability accurately and effectively, especially for real-world …

Towards automated discovery of crash-resistant primitives in binary executables

B Kollenda, E Göktaş, T Blazytko… - 2017 47th Annual …, 2017 - ieeexplore.ieee.org
Many modern defenses rely on address space layout randomization (ASLR) to efficiently
hide security-sensitive metadata in the address space. Absent implementation flaws, an …

Credal: Towards locating a memory corruption vulnerability with your core dump

J Xu, D Mu, P Chen, X Xing, P Wang, P Liu - Proceedings of the 2016 …, 2016 - dl.acm.org
After a program has crashed and terminated abnormally, it typically leaves behind a
snapshot of its crashing state in the form of a core dump. While a core dump carries a large …

Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

J Vadayath, M Eckert, K Zeng, N Weideman… - 31st USENIX Security …, 2022 - usenix.org
In spite of their effectiveness in the context of vulnerability discovery, current state-of-the-art
binary program analysis approaches are limited by inherent trade-offs between accuracy …

Static detection of uninitialized stack variables in binary code

B Garmany, M Stoffel, R Gawlik, T Holz - … 23–27, 2019, Proceedings, Part II …, 2019 - Springer
More than two decades after the first stack smashing attacks, memory corruption
vulnerabilities utilizing stack anomalies are still prevalent and play an important role in …

Chop: Bypassing runtime bounds checking through convex hull optimization

Y Chen, H Xue, T Lan, G Venkataramani - Computers & Security, 2020 - Elsevier
Unsafe memory accesses in programs written using popular programming languages like
C/C++ have been among the leading causes for software vulnerability. Prior memory safety …

Simber: Eliminating redundant memory bound checks via statistical inference

H Xue, Y Chen, F Yao, Y Li, T Lan… - ICT Systems Security and …, 2017 - Springer
Unsafe memory accesses in programs written using popular programming languages like C
and C++ have been among the leading causes of software vulnerability. Memory safety …

Patch based vulnerability matching for binary programs

Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The binary-level function matching has been widely used to detect whether there are 1-day
vulnerabilities in released programs. However, the high false positive is a challenge for …

Leveraging semantic signatures for bug search in binary programs

J Pewny, F Schuster, L Bernhard, T Holz… - Proceedings of the 30th …, 2014 - dl.acm.org
Software vulnerabilities still constitute a high security risk and there is an ongoing race to
patch known bugs. However, especially in closed-source software, there is no …