The proliferation of IoT-devices is turning different kinds of embedded systems into another relevant target for malware developers. Consequently, recent botnets are providing clients for multiple host architectures, making the clustering of malware samples a non-trivial task. While several approaches exist for statically comparing binaries of the same architecture, there are no proposed methods to compare binaries across different architectures. Based on previous approaches for cross-architecture bug identification, we present CrossDiff, a tool to compare executable binaries compiled for ARM, MIPS, PowerPC and x86. CrossDiff detects functions in the input executables and translates their instructions into a common intermediate representati...
The identification of similar functions in malware assists analysis by supporting the exclusion of f...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Large software projects contain significant code duplication, mainly due to copying and pasting code...
The proliferation of IoT-devices is turning different kinds of embedded systems into another relevan...
Abstract-With the general availability of closed-source software for various CPU architectures, ther...
Comparison of functions is required in various domains of software engineering. In most domains, ...
Different from source code clone detection, clone detection (similar code search) in binary executab...
As the volume of malware inexorably rises, comparison of binary code is of increasing importance to ...
Open-source libraries are widely used in software development, and the functions from these librarie...
With the undeniable increase in popularity of open source software, also the availability and reuse ...
Open-source libraries are widely used in software development, and the functions from these librarie...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
<p>Matching function binaries—the process of identifying similar functions among binary executables—...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
The identification of similar functions in malware assists analysis by supporting the exclusion of f...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Large software projects contain significant code duplication, mainly due to copying and pasting code...
The proliferation of IoT-devices is turning different kinds of embedded systems into another relevan...
Abstract-With the general availability of closed-source software for various CPU architectures, ther...
Comparison of functions is required in various domains of software engineering. In most domains, ...
Different from source code clone detection, clone detection (similar code search) in binary executab...
As the volume of malware inexorably rises, comparison of binary code is of increasing importance to ...
Open-source libraries are widely used in software development, and the functions from these librarie...
With the undeniable increase in popularity of open source software, also the availability and reuse ...
Open-source libraries are widely used in software development, and the functions from these librarie...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
<p>Matching function binaries—the process of identifying similar functions among binary executables—...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
The identification of similar functions in malware assists analysis by supporting the exclusion of f...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Large software projects contain significant code duplication, mainly due to copying and pasting code...