[HTML][HTML] Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations

X Zhang, F Breitinger, E Luechinger… - Forensic Science …, 2021 - Elsevier
Android obfuscation techniques include not only classic code obfuscation techniques that
were adapted to Android, but also obfuscation methods that target the Android platform …

A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

Learning to fuzz from symbolic execution with application to smart contracts

J He, M Balunović, N Ambroladze, P Tsankov… - Proceedings of the …, 2019 - dl.acm.org
Fuzzing and symbolic execution are two complementary techniques for discovering software
vulnerabilities. Fuzzing is fast and scalable, but can be ineffective when it fails to randomly …

Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings

X Jin, K Pei, JY Won, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …

{HALucinator}: Firmware re-hosting through abstraction layer emulation

AA Clements, E Gustafson, T Scharnowski… - 29th USENIX Security …, 2020 - usenix.org
Given the increasing ubiquity of online embedded devices, analyzing their firmware is
important to security, privacy, and safety. The tight coupling between hardware and firmware …

Typilus: Neural type hints

M Allamanis, ET Barr, S Ducousso, Z Gao - Proceedings of the 41st acm …, 2020 - dl.acm.org
Type inference over partial contexts in dynamically typed languages is challenging. In this
work, we present a graph neural network model that predicts types by probabilistically …

Dire: A neural approach to decompiled identifier naming

J Lacomis, P Yin, E Schwartz… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
The decompiler is one of the most common tools for examining binaries without
corresponding source code. It transforms binaries into high-level code, reversing the …

The tangled genealogy of IoT malware

E Cozzi, PA Vervier, M Dell'Amico, Y Shen… - Proceedings of the 36th …, 2020 - dl.acm.org
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of
large-scale IoT botnets has dramatically increased the volume and sophistication of Linux …

StateFormer: fine-grained type recovery from binaries using generative state modeling

K Pei, J Guan, M Broughton, Z Chen, S Yao… - Proceedings of the 29th …, 2021 - dl.acm.org
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …

Extending source code pre-trained language models to summarise decompiled binaries

A Al-Kaswan, T Ahmed, M Izadi… - … on Software Analysis …, 2023 - ieeexplore.ieee.org
Binary reverse engineering is used to understand and analyse programs for which the
source code is unavailable. Decompilers can help, transforming opaque binaries into a …