2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.49
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Architecture Bug Search in Binary Executables

Abstract: With the general availability of closed-source software for various CPU architectures, there is a need to identify security-critical vulnerabilities at the binary level to perform a vulnerability assessment. Unfortunately, existing bug finding methods fall short in that they i) require source code, ii) only work on a single architecture (typically x86), or iii) rely on dynamic analysis, which is inherently difficult for embedded devices.In this paper, we propose a system to derive bug signatures for known bugs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
98
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 220 publications
(98 citation statements)
references
References 23 publications
0
98
0
Order By: Relevance
“…First, static plagiarism detection or clone detection includes string-based [2], [5], [15], AST-based [32], [57], [63], [36], token-based [33], [55], [54], and PDGbased [22], [40], [11], [39]. Source code-based approaches are Recent works have applied traditional approaches to addressing the cross-architecture scenario [53], [19], [8], [20], [13], [14], [12]. Multi-MH and Multi-k-MH [53] are the first two methods for comparing functions of different ISAs.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…First, static plagiarism detection or clone detection includes string-based [2], [5], [15], AST-based [32], [57], [63], [36], token-based [33], [55], [54], and PDGbased [22], [40], [11], [39]. Source code-based approaches are Recent works have applied traditional approaches to addressing the cross-architecture scenario [53], [19], [8], [20], [13], [14], [12]. Multi-MH and Multi-k-MH [53] are the first two methods for comparing functions of different ISAs.…”
Section: Related Workmentioning
confidence: 99%
“…Source code-based approaches are Recent works have applied traditional approaches to addressing the cross-architecture scenario [53], [19], [8], [20], [13], [14], [12]. Multi-MH and Multi-k-MH [53] are the first two methods for comparing functions of different ISAs. But their fuzzing-based basic-block similarity comparison and graph (i.e., CFG) matching-based algorithms are very expensive.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations