2020
DOI: 10.48550/arxiv.2010.00770
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

XDA: Accurate, Robust Disassembly with Transfer Learning

Abstract: Accurate and robust disassembly of stripped binaries is challenging. The root of the difficulty is that highlevel structures, such as instruction and function boundaries, are absent in stripped binaries and must be recovered based on incomplete information. Current disassembly approaches rely on heuristics or simple pattern matching to approximate the recovery, but these methods are often inaccurate and brittle, especially across different compiler optimizations.We present XDA, a transfer-learning-based disass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(14 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…We want to clarify that like [23], [24], [25], [26] we do not target the function boundary identification task. Ghidra & Hexrays already do this at 90%+ accuracy.…”
Section: Inline Function Recoverymentioning
confidence: 99%
“…We want to clarify that like [23], [24], [25], [26] we do not target the function boundary identification task. Ghidra & Hexrays already do this at 90%+ accuracy.…”
Section: Inline Function Recoverymentioning
confidence: 99%
“…Similarly, many previous studies leverage neural networks to learn binary or assembly code representation. They perform well on binary-based downstream analysis tasks, including code clone detection [39], malicious code detection [2], and disassembly [170]. The application of deep learning in software analysis and software reverse engineering significantly reduces human resources and time costs, no matter from the view of developers or analysts.…”
mentioning
confidence: 99%
“…The application of deep learning in software analysis and software reverse engineering significantly reduces human resources and time costs, no matter from the view of developers or analysts. In addition, compared to traditional tools, the faster speed of deep neural-based disassembly approaches [170] makes them a powerful engine for downstream models like malware classification. It is meaningful to study how to make neural network (NN) models work well in software reverse engineering and software analysis.…”
mentioning
confidence: 99%
“…[76], [115], [175], [176], [197], function boundary detection [32], [42], [59], [62], [176], [197], static similarity detection [49], [73], [99], [107], [109], [113], [126], [130], [160], [169], type recovery [19], and full decompilation [28], [44], [101]. Each of these capabilities is in turn crucial for downstream security tasks such as malware analysis [51], [67], [81], [122] and software hardening via control-flow-integrity (CFI) enforcement, artificial diversification, or debloating when source code is not available.…”
Section: Introductionmentioning
confidence: 99%
“…Neural binary analyses (NBAs) are seemingly wellmatched to the problem domain, where inference is necessary due to the lossy compilation process. Recent work has shown great promise for performing accurate disassembly [176], [197], function boundary detection [42], [62], [176], [197], and static binary similarity detection [49], [73], [99], [109], [113], [126], [130], [160], [169] that is simultaneously more efficient than deterministic methods.…”
Section: Introductionmentioning
confidence: 99%