Skip to content

Latest commit

 

History

History
16 lines (12 loc) · 2.02 KB

README.md

File metadata and controls

16 lines (12 loc) · 2.02 KB

NDSS2024

Number of papers: 2

  • Authors: Peiwei Hu and Chinese Academy of Sciences and Beijing and China) and Ruigang Liang and Chinese Academy of Sciences and Beijing and China) and Kai Chen and Chinese Academy of Sciences and China)
  • Abstract: Reverse engineering is essential in malware analysis, vulnerability discovery, etc. Decompilers assist the reverse engineers by lifting the assembly to the high-level programming language, which highly boosts binary comprehension. However, decompilers suffer from problems such as meaningless variable names, redundant variables, and lacking comments describing the purpose of the code. Previous studies have shown promising performance in refining the decompiler output by training the models with h...
  • Link: Read Paper
  • Labels: static analysis, program decompilation
  • Authors: Ruijie Meng and Singapore) and Martin Mirchev and Marcel Böhme and Germany and Monash University and Australia) and Abhik Roychoudhury
  • Abstract: How to find security flaws in a protocol implementation without a machine-readable specification of the protocol? Facing the internet, protocol implementations are particularly security-critical software systems where inputs must adhere to a specific structure and order that is often informally specified in hundreds of pages in natural language (RFC). Without some machine-readable version of that protocol, it is difficult to automatically generate valid test inputs for its implementation that fo...
  • Link: Read Paper
  • Labels: program testing, fuzzing, protocol fuzzing