Search Results - "program and binary analysis"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing by Ammann, Max, Hirschi, Lucca, Kremer, Steve

    ISSN: 2375-1207
    Published: IEEE 19.05.2024
    “…Critical and widely used cryptographic protocols have repeatedly been found to contain flaws in their design and their implementation. A prominent class of…”
    Get full text
    Conference Proceeding
  2. 2

    "Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning by Pal, Kuntal Kumar, Bajaj, Ati Priya, Banerjee, Pratyay, Dutcher, Audrey, Nakamura, Mutsumi, Basque, Zion Leonahenahe, Gupta, Himanshu, Sawant, Saurabh Arjun, Anantheswaran, Ujjwala, Shoshitaishvili, Yan, Doupe, Adam, Baral, Chitta, Wang, Ruoyu

    ISSN: 2375-1207
    Published: IEEE 19.05.2024
    “…Binary reverse engineering is an arduous and tedious task performed by skilled and expensive human analysts. Information about the source code is irrevocably…”
    Get full text
    Conference Proceeding
  3. 3

    Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks by Wiebing, Sander, Giuffrida, Cristiano

    ISSN: 2375-1207
    Published: IEEE 12.05.2025
    “…Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers…”
    Get full text
    Conference Proceeding
  4. 4

    D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling by Ye, Yapeng, Zhang, Zhuo, Shi, Qingkai, Aafer, Yousra, Zhang, Xiangyu

    ISSN: 2375-1207
    Published: IEEE 01.05.2023
    “…ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a…”
    Get full text
    Conference Proceeding