Publications

Filter by type:

[USENIX Security'17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

Details PDF

[ConPro'17] Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions

Details

[S&P'17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping

Details PDF CSAW'17 Applied Research Competition Top 10 Finalists

[TSE] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection

Details

[SCAM'16] BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling

Details PDF Code

[ISC'16] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method

Details PDF Code

[ASE'16] StraightTaint: Decoupled Offline Symbolic Taint Analysis

Details PDF

[TR] Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection

Details PDF

[JICV] Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications

Details

[JICV] MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization

Details

[Euro S&P'16] Translingual Obfuscation

Details PDF Long Version in arXiv

[CODASPY'16] Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics

Details PDF

[ITCon] Automatic Building Information Model Query Generation

Details

[CCS'15] LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code

Details PDF Code

[USENIX Security'15] TaintPipe: Pipelined Symbolic Taint Analysis

Details PDF

[ACNS'15] Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications

Details PDF

[IFIP SEC'15] Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference

Details PDF

[FSE'14] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection

Details PDF Distinguished Paper Award Nomination

[ICISC'12] iBinHunt: Binary Hunting with Inter-Procedural Control Flow

Details PDF

[ASCE'12] BIM Server Requirements to Support the Energy Efficient Building Lifecycle

Details PDF

[ESORICS'11] Linear Obfuscation to Combat Symbolic Execution

Details PDF Dataset

[NSS'11] Towards Ground Truthing Observations in Gray-Box Anomaly Detection

Details PDF

[ICICS'09] Denial-of-Service Attacks on Host-Based Generic Unpackers

Details PDF