Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013
DOI: 10.1145/2430553.2430558
|View full text |Cite
|
Sign up to set email alerts
|

Fast location of similar code fragments using semantic 'juice'

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(35 citation statements)
references
References 7 publications
0
35
0
Order By: Relevance
“…Modern approaches for binaries follow strategies to compare the semantics of code. Examples are TEDEM [23], Exposé [22], BinHunt [8], its follow-up project, iBinHunt [21], and BinJuice [17], which uses syntactic equations similar to our formulas and hashes those to measure similarity. BinHash [14] inspired our sampling, which is also used by Blanket Execution (Blex) [6]).…”
Section: Related Workmentioning
confidence: 99%
“…Modern approaches for binaries follow strategies to compare the semantics of code. Examples are TEDEM [23], Exposé [22], BinHunt [8], its follow-up project, iBinHunt [21], and BinJuice [17], which uses syntactic equations similar to our formulas and hashes those to measure similarity. BinHash [14] inspired our sampling, which is also used by Blanket Execution (Blex) [6]).…”
Section: Related Workmentioning
confidence: 99%
“…This includes websites, e-mail messages and PE file headers. Names, addresses, and certain constants are generalized using BinJuice [89]. The discovery system itself uses concolic execution: It is able to explore multiple execution paths by using an SMT solver to create new input values for subsequent runs.…”
Section: Malware Analysis Solutionsmentioning
confidence: 99%
“…To match the basic blocks with the same semantics, BinHunt [44] and its successor iBinHunt [45] performed symbolic execution in the scope of basic blocks and verified the equivalence of the input-output relationship formulas with theorem proving techniques. BinJuice [46] represented abstraction of semantics of basic blocks as "semantic juice" and matched malware variants with such semantic juice. Exposé [47] combined function-level syntactic heuristics with semantics detection.…”
Section: Semantic Differential Detectionmentioning
confidence: 99%
“…Luo et al [48] detected software plagiarism by matching longest common subsequence of semantically equivalent basic blocks. However, these tools suffered from the "block-centric" limitation [46]; that is, they were insufficient to capture similarities or differences across basic blocks. In contrast, LoPD is trace-oriented and is therefore able to find similarities and differences beyond the scope of basic blocks to a great extent.…”
Section: Semantic Differential Detectionmentioning
confidence: 99%