Proceedings 2020 Workshop on Binary Analysis Research 2020
DOI: 10.14722/bar.2020.23009
|View full text |Cite
|
Sign up to set email alerts
|

QSynth - A Program Synthesis based approach for Binary Code Deobfuscation

Abstract: Assessing software robustness became arduous given the broad adoption of obfuscation in the industry and especially in mobile applications and embedded systems. As such, deobfuscation is becoming crucially important. Obfuscation usually concerns either target the control-flow or the data-flow of the program. While standard static and dynamic analyses suffer some shortcomings, Dynamic Symbolic Execution (DSE) turns out to be very effective on control-flow obfuscation. Yet, fewer approaches address issues raised… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(30 citation statements)
references
References 22 publications
0
30
0
Order By: Relevance
“…To the best of our knowledge, there are no predefined metrics to measure whether the deobfuscation result is easier to understand. David et al [23] provide a solution for evaluating the size reduction factor of the obfuscated expression against the synthesized one. In addition, we also use the user study in Section 6.6 to evaluate the deobfuscation results.…”
Section: Metrics For Deobfuscation Result Deobfuscation Aimsmentioning
confidence: 99%
See 3 more Smart Citations
“…To the best of our knowledge, there are no predefined metrics to measure whether the deobfuscation result is easier to understand. David et al [23] provide a solution for evaluating the size reduction factor of the obfuscated expression against the synthesized one. In addition, we also use the user study in Section 6.6 to evaluate the deobfuscation results.…”
Section: Metrics For Deobfuscation Result Deobfuscation Aimsmentioning
confidence: 99%
“…at is different from previous work since they all assume that the obfuscated instructions are known [22,23].…”
Section: Introductionmentioning
confidence: 88%
See 2 more Smart Citations
“…In the second type, the oracle cannot verify the correctness of the synthesized program but can provide a set of input-output examples. This includes the applications where the oracle is a black-box program, such as binary programs [Zhai et al 2016], and applications where the program is too complex to verify its correctness, e.g., the task involves system calls or complex loops, such as program repair, second-order execution, and deobfuscation [Blazytko et al 2017;David et al 2020;Jha et al 2010;Mechtaev et al 2018Mechtaev et al , 2015a.…”
Section: Introductionmentioning
confidence: 99%