Lots of work has been done on analyzing software distributed in binary form. This is a challenging problem because of the relatively unstructured nature of binaries. To recover high-level structure, various attempts have included static and dynamic analysis. However, human inspection is often required, as high-level structure is compiled away. Recent success in this area includes work on variable-name recovery, vulnerability discovery, class recovery for object-oriented languages. We are interested in building a pipeline for user to analyze malware. In this thesis we tackle two problems central to malware analysis pipelines. The first is D3RE, an interactive querying tool that allows users to analyze binaries interactively by writing declar...
Many security techniques have been developed both in academia and industry to analyze source code, i...
Malware classification, specifically the task of grouping malware samples into families according to...
Malware attacks are a significant and frequently reported problem, adversely affecting the productivit...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
The motivation for this project is driven by evaluation of the different tools on the market that al...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
As we transition our society into the digital age, the increasing prevalence of IoT Networks and de...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Code reuse detection is a key technique in reverse engineering. However, existing source code simila...
Reverse engineering binary executable code is gaining more interest in the research community. Agenc...
The process of software reverse engineering and malware analysis often comprise a combination of sta...
Software security researchers commonly reverse engineer and analyze current malicious software (malw...
Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released ope...
As the complexity of malware grows, so does the necessity of employing program structuring mechanism...
In system and software security, one of the first criteria before applying an analysis methodology i...
Many security techniques have been developed both in academia and industry to analyze source code, i...
Malware classification, specifically the task of grouping malware samples into families according to...
Malware attacks are a significant and frequently reported problem, adversely affecting the productivit...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
The motivation for this project is driven by evaluation of the different tools on the market that al...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
As we transition our society into the digital age, the increasing prevalence of IoT Networks and de...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Code reuse detection is a key technique in reverse engineering. However, existing source code simila...
Reverse engineering binary executable code is gaining more interest in the research community. Agenc...
The process of software reverse engineering and malware analysis often comprise a combination of sta...
Software security researchers commonly reverse engineer and analyze current malicious software (malw...
Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released ope...
As the complexity of malware grows, so does the necessity of employing program structuring mechanism...
In system and software security, one of the first criteria before applying an analysis methodology i...
Many security techniques have been developed both in academia and industry to analyze source code, i...
Malware classification, specifically the task of grouping malware samples into families according to...
Malware attacks are a significant and frequently reported problem, adversely affecting the productivit...