Highly security sensitive organizations often perform source code audits on software they use. However, after the audit is performed, they must still perform a binary code audit to ensure the binary provided to them matches the source code that was audited. BinPro seeks to reduce the manual effort required to perform the binary audit by accounting for the binary versions of functions in a given source code. To do this, BinPro combines static analysis, graph matching and machine learning. Over a corpus of 10 applications, BinPro is able to match 74% of binary functions with their source code counterparts, and thus determine that they are free of malicious backdoors if their source code version is. When evaluated on applications that back...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Abstract Tackling binary program analysis problems has traditionally implied manually defining rules...
Highly security sensitive organizations often perform source code audits on software they use. Howe...
Currently, software organizations face critical issues associated with computer security, considerin...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Currently, software organizations face critical issues associated with computer security, considerin...
The increased usage of open-source software (OSS) libraries as building blocks in the software indus...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Abstract. The analysis of binary code is a crucial activity in many areas of the computer sciences a...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
The paper approaches the low-level details of the code generated by compilers whose format permits o...
Reverse engineering of executable binary programs has diverse applications in computer security and ...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Abstract Tackling binary program analysis problems has traditionally implied manually defining rules...
Highly security sensitive organizations often perform source code audits on software they use. Howe...
Currently, software organizations face critical issues associated with computer security, considerin...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Currently, software organizations face critical issues associated with computer security, considerin...
The increased usage of open-source software (OSS) libraries as building blocks in the software indus...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Abstract. The analysis of binary code is a crucial activity in many areas of the computer sciences a...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
The paper approaches the low-level details of the code generated by compilers whose format permits o...
Reverse engineering of executable binary programs has diverse applications in computer security and ...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Abstract Tackling binary program analysis problems has traditionally implied manually defining rules...