A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing

I Yun, S Lee, M Xu, Y Jang, T Kim - 27th USENIX Security Symposium …, 2018 - usenix.org
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …

{DroidScope}: Seamlessly reconstructing the {OS} and dalvik semantic views for dynamic android malware analysis

LK Yan, H Yin - 21st USENIX security symposium (USENIX security 12), 2012 - usenix.org
The prevalence of mobile platforms, the large market share of Android, plus the openness of
the Android Market makes it a hot target for malware attacks. Once a malware sample has …

Unleashing mayhem on binary code

SK Cha, T Avgerinos, A Rebert… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
In this paper we present Mayhem, a new system for automatically finding exploitable bugs in
binary (ie, executable) programs. Every bug reported by Mayhem is accompanied by a …

A complete formal semantics of x86-64 user-level instruction set architecture

S Dasgupta, D Park, T Kasampalis, VS Adve… - Proceedings of the 40th …, 2019 - dl.acm.org
We present the most complete and thoroughly tested formal semantics of x86-64 to date. Our
semantics faithfully formalizes all the non-deprecated, sequential user-level instructions of …

Grey-box concolic testing on binary code

J Choi, J Jang, C Han, SK Cha - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
We present grey-box concolic testing, a novel path-based test case generation method that
combines the best of both white-box and grey-box fuzzing. At a high level, our technique …

Precise and scalable detection of double-fetch bugs in OS kernels

M Xu, C Qian, K Lu, M Backes… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
During system call execution, it is common for operating system kernels to read userspace
memory multiple times (multi-reads). A critical bug may exist if the fetched userspace …

How far we have come: Testing decompilation correctness of C decompilers

Z Liu, S Wang - Proceedings of the 29th ACM SIGSOFT International …, 2020 - dl.acm.org
AC decompiler converts an executable (the output from a C compiler) into source code. The
recovered C source code, once recompiled, will produce an executable with the same …