Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

Binary-code obfuscations in prevalent packer tools

KA Roundy, BP Miller - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
The first steps in analyzing defensive malware are understanding what obfuscations are
present in real-world malware binaries, how these obfuscations hinder analysis, and how …

Introduction to runtime verification

E Bartocci, Y Falcone, A Francalanza… - Lectures on Runtime …, 2018 - Springer
The aim of this chapter is to act as a primer for those wanting to learn about Runtime
Verification (RV). We start by providing an overview of the main specification languages …

Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization

S Dinesh, N Burow, D Xu… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …

Practical context-sensitive CFI

V Van der Veen, D Andriesse, E Göktaş… - Proceedings of the …, 2015 - dl.acm.org
Current Control-Flow Integrity (CFI) implementations track control edges individually,
insensitive to the context of preceding edges. Recent work demonstrates that this leaves …

A tough call: Mitigating advanced code-reuse attacks at the binary level

V Van Der Veen, E Göktas, M Contag… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Current binary-level Control-Flow Integrity (CFI) techniques are weak in determining the set
of valid targets for indirect control flow transfers on the forward edge. In particular, the lack of …

Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing

S Nagy, M Hicks - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Coverage-guided fuzzing is one of the most successful approaches for discovering software
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …

An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries

D Andriesse, X Chen, V Van Der Veen… - 25th USENIX security …, 2016 - usenix.org
It is well-known that static disassembly is an unsolved problem, but how much of a problem
is it in real software—for instance, for binary protection schemes? This work studies the …

[PDF][PDF] Ramblr: Making Reassembly Great Again.

R Wang, Y Shoshitaishvili, A Bianchi, A Machiry… - NDSS, 2017 - sefcom.asu.edu
Static binary rewriting has many important applications in reverse engineering, such as
patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for …

Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask

C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …