AbstractCompiler provenance encompasses numerous pieces of information, such as the compiler family, compiler version, optimization level, and compiler-related functions. The extraction of such information is imperative for various binary analysis applications, such as function fingerprinting, clone detection, and authorship attribution. It is thus important to develop an efficient and automated approach for extracting compiler provenance. In this study, we present BinComp, a practical approach which, analyzes the syntax, structure, and semantics of disassembled functions to extract compiler provenance. BinComp has a stratified architecture with three layers. The first layer applies a supervised compilation process to a set of known program...
A provenance-aware computer system is one that records information about the operations it performs ...
Why was this binary written? Which compiler was used? Which free software packages did the develope...
Reverse-engineering program binaries often relies on the recovery of high-level data abstractions. I...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
University of Minnesota M.S. thesis. June 2019. Major: Computer Science. Advisor: Peter Peterson. 1 ...
When compiling a source file, several flags can be passed to the compiler. These flags, however, can...
Debugging symbols in binary executables carry the names of functions and global variables. When pres...
Reverse engineering of executable binary programs has diverse applications in computer security and ...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
We study the evolution of the largest known corpus of publicly available source code, i.e., the Soft...
International audienceThis paper reports on the correctness proof of compiler optimizations based on...
In this work we analyze the typical operations of data preparation within a machine learning process...
Highly security sensitive organizations often perform source code audits on software they use. Howe...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
A provenance-aware computer system is one that records information about the operations it performs ...
Why was this binary written? Which compiler was used? Which free software packages did the develope...
Reverse-engineering program binaries often relies on the recovery of high-level data abstractions. I...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
University of Minnesota M.S. thesis. June 2019. Major: Computer Science. Advisor: Peter Peterson. 1 ...
When compiling a source file, several flags can be passed to the compiler. These flags, however, can...
Debugging symbols in binary executables carry the names of functions and global variables. When pres...
Reverse engineering of executable binary programs has diverse applications in computer security and ...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
We study the evolution of the largest known corpus of publicly available source code, i.e., the Soft...
International audienceThis paper reports on the correctness proof of compiler optimizations based on...
In this work we analyze the typical operations of data preparation within a machine learning process...
Highly security sensitive organizations often perform source code audits on software they use. Howe...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
A provenance-aware computer system is one that records information about the operations it performs ...
Why was this binary written? Which compiler was used? Which free software packages did the develope...
Reverse-engineering program binaries often relies on the recovery of high-level data abstractions. I...