Validating the correctness of binary lifters is pivotal to gain trust in binary analysis, especially when used in scenarios where correctness is important. Existing approaches focus on …
M Jung, S Kim, H Han, J Choi… - Proceedings of the NDSS …, 2019 - ndss-symposium.org
Current binary analysis research focuses mainly on the back-end, but not on the front-end. However, we note that there are several key design points in the front-end that can greatly …
T Pfeffer, P Herber, L Druschke… - 2018 IEEE 27th …, 2018 - ieeexplore.ieee.org
Approaches for the automatic analysis of security policies on source code level cannot trivially be applied to binaries. This is due to the lacking high-level semantics of low-level …
C Groh, S Proskurin, A Zarras - Proceedings of the 38th ACM/SIGAPP …, 2023 - dl.acm.org
Many privilege escalation exploits on Linux abuse vulnerable system calls to threaten the system's security. Therefore, various static and dynamic analysis based seccomp policy …
In this work, we explore novel virtualization-assisted techniques to further enhance their capacity with regard to security. Specifically, we position our research around two main …
Confidential software is an important requirement for the ongoing digitalization. Yet, since confidentiality is a program-wide property, this requirement is at odds with modern software …