2020
DOI: 10.1016/j.cose.2020.102072
|View full text |Cite
|
Sign up to set email alerts
|

Semantics-aware obfuscation scheme prediction for binary

Abstract: This is a repository copy of Semantics-aware obfuscation scheme prediction for binary.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 31 publications
(41 reference statements)
0
5
0
Order By: Relevance
“…On the other hand, code obfuscation techniques, such as instruction replacement, dead code insertion, function inlining, etc., that commit changes to the code [30,32] are very likely to destroy or submerge features important to compiler identification, hence decreasing the detection accuracy. One possible solution to this problem is to deobfuscate the binaries first with deobfuscation techniques [22,44,49] before enforcing compiler identification. Another possible way is to adopt the idea of adversarial training [40], which trains the compiler identification model with adversarial examples (i.e.…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand, code obfuscation techniques, such as instruction replacement, dead code insertion, function inlining, etc., that commit changes to the code [30,32] are very likely to destroy or submerge features important to compiler identification, hence decreasing the detection accuracy. One possible solution to this problem is to deobfuscate the binaries first with deobfuscation techniques [22,44,49] before enforcing compiler identification. Another possible way is to adopt the idea of adversarial training [40], which trains the compiler identification model with adversarial examples (i.e.…”
Section: Discussionmentioning
confidence: 99%
“…Even though obfuscation can hide semantics very well, there can still be some hints left. Existing obfuscation detection work has high accuracy [13,[33][34][35][36][37]. us, we are motivated to employ a classifier to detect which basic block is obfuscated.…”
Section: Obfuscated Instructions Detectormentioning
confidence: 99%
“…Dataset1: We use a dataset of OBFEYE [13], which contains over 277,000 obfuscated samples with different individual obfuscation schemes. e source codes of OBFEYE's datasets come from the real world like GNU Toolkit and gcc-7.4.0.…”
Section: Datasetsmentioning
confidence: 99%
See 2 more Smart Citations