Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Type inference on executables

J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …

[PDF][PDF] AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.

J Zaddach, L Bruno, A Francillon, D Balzarotti - NDSS, 2014 - researchgate.net
To address the growing concerns about the security of embedded systems, it is important to
perform accurate analysis of firmware binaries, even when the source code or the hardware …

[PDF][PDF] Effective and efficient malware detection at the end host.

C Kolbitsch, PM Comparetti, C Kruegel… - USENIX security …, 2009 - usenix.org
Malware is one of the most serious security threats on the Internet today. In fact, most
Internet problems such as spam e-mails and denial of service attacks have malware as their …

Malware investigation by analyzing computer memory

M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …

StateFormer: fine-grained type recovery from binaries using generative state modeling

K Pei, J Guan, M Broughton, Z Chen, S Yao… - Proceedings of the 29th …, 2021 - dl.acm.org
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …

Synthesizing near-optimal malware specifications from suspicious behaviors

M Fredrikson, S Jha, M Christodorescu… - … IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Fueled by an emerging underground economy, malware authors are exploiting
vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly …

[PDF][PDF] Howard: A Dynamic Excavator for Reverse Engineering Data Structures.

A Slowinska, T Stancescu, H Bos - NDSS, 2011 - ndss-symposium.org
Even the most advanced reverse engineering techniques and products are weak in
recovering data structures in stripped binaries—binaries without symbol tables …

Acquisition and analysis of volatile memory from android devices

J Sylve, A Case, L Marziale, GG Richard - Digital Investigation, 2012 - Elsevier
The Android operating system for mobile phones, which is still relatively new, is rapidly
gaining market share, with dozens of smartphones and tablets either released or set to be …

Mapping kernel objects to enable systematic integrity checking

M Carbone, W Cui, L Lu, W Lee, M Peinado… - Proceedings of the 16th …, 2009 - dl.acm.org
Dynamic kernel data have become an attractive target for kernel-mode malware. However,
previous solutions for checking kernel integrity either limit themselves to code and static data …