Reverse engineering tools rely on the critical image base value for tasks such as correctly mapping code into virtual memory for an emulator or accurately determining branch destinations for a disassembler. However, binaries are often stripped and therefore, do not explicitly state this value. Currently available solutions for calculating this essential value generally require user input in the form of parameter configurations or manual binary analysis, thus these methods are limited by the experience and knowledge of the user. In this thesis, we propose a user-independent solution for determining the image base of ARM32 binaries and describe our implementation. Our solution makes use of features present in all ARM32 binaries, utilizing sta...
This thesis explores how architecture and endianness of executable code can be identified using bina...
In this paper, a new method to compute the image histogram is presented, along with the image maximu...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Reverse engineering of executable binary programs has diverse applications in computer security and ...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
Binary analysis or the ability to analyze binary code is an important capability required for many s...
Binary rewriting techniques are widely used in program vulnerability fixing, obfuscation, security-o...
Complexity in malicious software is increasing to avoid detection and mitigation. As such, there is ...
This dataset and pre-trained models are released as a companion to our OOPSLA '20 publication: "Neur...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
Reverse engineering binary executable code is gaining more interest in the research community. Agenc...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
In this article, we introduce a novel technique to remove binary artifacts. Given a gray-intensity i...
An attractive approach for fast search in image databases is binary hashing, where each high-dimensi...
This thesis explores how architecture and endianness of executable code can be identified using bina...
In this paper, a new method to compute the image histogram is presented, along with the image maximu...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Reverse engineering of executable binary programs has diverse applications in computer security and ...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
Binary analysis or the ability to analyze binary code is an important capability required for many s...
Binary rewriting techniques are widely used in program vulnerability fixing, obfuscation, security-o...
Complexity in malicious software is increasing to avoid detection and mitigation. As such, there is ...
This dataset and pre-trained models are released as a companion to our OOPSLA '20 publication: "Neur...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
Reverse engineering binary executable code is gaining more interest in the research community. Agenc...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
In this article, we introduce a novel technique to remove binary artifacts. Given a gray-intensity i...
An attractive approach for fast search in image databases is binary hashing, where each high-dimensi...
This thesis explores how architecture and endianness of executable code can be identified using bina...
In this paper, a new method to compute the image histogram is presented, along with the image maximu...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...