With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that binary code can be extracted and reused, they are often based on static analysis and face challenges when coping with obfuscated binaries. This paper introduces trace-oriented programming (TOP), a general framework for generating new software from existing binary code by elevating the low-level binary code to C code with templates and inlined assembly. Different from existing work, TOP gains benefits from dynamic analysis such as resilience against obfuscation and avoidance of points-to analysis. Thus, TOP can be used for malware analysis, especially for mal...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware programs that incorporate trigger-based behavior initiate malicious activities based on cond...
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code ...
With the wide existence of binary code, it is desirable to reuse it in many security applications, s...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
In Man-At-The-End (MATE) attacks, software apps run on a device under full control of the attackers:...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...
International audience—Code obfuscation is designed to impede the reverse engineering of a binary so...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Many experts believe that new malware is created at a rate faster than legitimate software. For exam...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware programs that incorporate trigger-based behavior initiate malicious activities based on cond...
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code ...
With the wide existence of binary code, it is desirable to reuse it in many security applications, s...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
In Man-At-The-End (MATE) attacks, software apps run on a device under full control of the attackers:...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...
International audience—Code obfuscation is designed to impede the reverse engineering of a binary so...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Many experts believe that new malware is created at a rate faster than legitimate software. For exam...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware programs that incorporate trigger-based behavior initiate malicious activities based on cond...
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code ...