2015
DOI: 10.1016/j.diin.2015.05.015
|View full text |Cite
|
Sign up to set email alerts
|

BinComp: A stratified approach to compiler provenance Attribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 44 publications
(32 citation statements)
references
References 5 publications
0
32
0
Order By: Relevance
“…In [33] the same authors outperformed their previous solution combining idioms with graphlets. Rahimian et al [32] proposed an approach based on annotated control flow graph (ACFG) to recover the compiler provenance of a binary, however their approach seems to be less accurate than [33]. Recently, Chen et al [13] proposed a deep neural network that recovers the optimization level of different functions compiled with gcc; they show that the learned model is explicable as it learn common compiler convention.…”
Section: B Compiler Provenancementioning
confidence: 99%
“…In [33] the same authors outperformed their previous solution combining idioms with graphlets. Rahimian et al [32] proposed an approach based on annotated control flow graph (ACFG) to recover the compiler provenance of a binary, however their approach seems to be less accurate than [33]. Recently, Chen et al [13] proposed a deep neural network that recovers the optimization level of different functions compiled with gcc; they show that the learned model is explicable as it learn common compiler convention.…”
Section: B Compiler Provenancementioning
confidence: 99%
“…Rahimian et al developed BinComp [25], an approach in which they analyze the syntax, structure, and semantics of disassembled functions to extract the compiler provenance. BinComp has an identification accuracy of 0.801 in 8 classes classification in their experiments.…”
Section: A Compiler Provenancementioning
confidence: 99%
“…Program binaries are often the focus of forensic investigations [25], [29], [26], covering numerous issues from copyright infringement [31] to malware analysis [3], [2]. Program binary analysis is a challenging task due to the absence of highlevel information, which is found in source code, and the myriad variations in compiler provenance.…”
Section: Introductionmentioning
confidence: 99%
“…Fingerprinting binary functions can be of paramount importance in reverse engineering. Function fingerprinting has many applications including compiler identification [3], authorship analysis, clone detection, vulnerability detection, provenance analysis, malware detection, malware classification [2], etc. One benefit of function fingerprinting is tagging a suspicious binary as malicious or benign.…”
Section: Reverse Engineering and Function Fingerprintingmentioning
confidence: 99%