2021
DOI: 10.1016/j.comcom.2021.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Osprey: A fast and accurate patch presence test framework for binaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…PS 3 can work with various architectures, since we can access the source code and compile it into the corresponding binaries. Angr is an open source binary program analysis framework in Python and has been used extensively in binary analysis [8,17,22], as well as patch presence test [23,33,37]. We use Z3 [15] to simplify the expression and calculation of the stack address offset to ensure that the memory mapping is more precise.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…PS 3 can work with various architectures, since we can access the source code and compile it into the corresponding binaries. Angr is an open source binary program analysis framework in Python and has been used extensively in binary analysis [8,17,22], as well as patch presence test [23,33,37]. We use Z3 [15] to simplify the expression and calculation of the stack address offset to ensure that the memory mapping is more precise.…”
Section: Methodsmentioning
confidence: 99%
“…The four projects involved cryptographic protocols, video processing, packet and xml analyzer. They are widely used in studies on vulnerability matching and patch presence testing [33,36]. We only consider these four popular C/C++ projects in our experiments, although the method we proposed is general for compiled language.…”
Section: Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, many studies aim to better identify the causes of security vulnerabilities in binary. [17], [18] enabled finding similar patches or vulnerabilities in different binaries by identifying code portions changed by a binary patch through basic block analysis. [19] detected software vulnerabilities in the binary codes of patched and unpatched programs using the patch diffing technology.…”
Section: Binary Patchmentioning
confidence: 99%