Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Manticore: A user-friendly symbolic execution framework for binaries and smart contracts

M Mossberg, F Manzano, E Hennenfent… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
An effective way to maximize code coverage in software tests is through dynamic symbolic
execution-a technique that uses constraint solving to systematically explore a program's …

[PDF][PDF] Avatar 2: A multi-target orchestration platform

M Muench, D Nisi, A Francillon… - Proc. Workshop Binary …, 2018 - eurecom.fr
Dynamic binary analysis techniques play a central role to study the security of software
systems and detect vulnerabilities in a broad range of devices and applications. Over the …

Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level

LA Daniel, S Bardin, T Rezk - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The constant-time programming discipline (CT) is an efficient countermeasure against timing
side-channel attacks, requiring the control flow and the memory accesses to be independent …

Binary-level directed fuzzing for {use-after-free} vulnerabilities

MD Nguyen, S Bardin, R Bonichon, R Groz… - … on Research in Attacks …, 2020 - usenix.org
Directed fuzzing focuses on automatically testing specific parts of the code by taking
advantage of additional information such as (partial) bug stack trace, patches or risky …

Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse

LA Daniel, S Bardin, T Rezk - NDSS 2021-Network and Distributed …, 2021 - inria.hal.science
Spectre are microarchitectural attacks which were made public in January 2018. They allow
an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly …

Symbolic deobfuscation: From virtualized code back to the original

J Salwan, S Bardin, ML Potet - … Conference on Detection of Intrusions and …, 2018 - Springer
Software protection has taken an important place during the last decade in order to protect
legit software against reverse engineering or tampering. Virtualization is considered as one …

BINSEC/REL: symbolic binary analyzer for security with applications to constant-time and secret-erasure

LA Daniel, S Bardin, T Rezk - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
This article tackles the problem of designing efficient binary-level verification for a subset of
information flow properties encompassing constant-time and secret-erasure. These …

Backward-bounded DSE: targeting infeasibility questions on obfuscated codes

S Bardin, R David, JY Marion - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Software deobfuscation is a crucial activity in security analysis and especially in malware
analysis. While standard static and dynamic approaches suffer from well-known …

VMHunt: A verifiable approach to partially-virtualized binary code simplification

D Xu, J Ming, Y Fu, D Wu - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Code virtualization is a highly sophisticated obfuscation technique adopted by malware
authors to stay under the radar. However, the increasing complexity of code virtualization …