The official workshop proceedings will be published after the workshop.
Please find below all preprints of the accepted papers and links to released research artifacts.
Title | Preprint | Artifacts | Slides |
---|---|---|---|
o-glassesX: Compiler Provenance Recovery with Attention Mechanism from a Short Code Fragment | GitHub | ||
Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture | GitHub | PPTX | |
Creating Human Readable Path Constraints from Symbolic Execution | GitHub | PDF PPTX | |
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution | GitHub | ||
It Doesn’t Have to Be So Hard: Efficient Symbolic Reasoning for CRC | GitHub | ||
A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly | GitHub (tool) GitHub (evaluation) |
||
QSynth - A Program Synthesis based approach for Binary Code Deobfuscation | GitHub |
Time | Item |
---|---|
9:20 am - 9:30 am | Welcome and Opening Remarks |
9:30 am - 10:30 am | Keynote: The hard things about analyzing 1’s and 0’s... Dr. David Brumley, Carnegie Mellon University - ForAllSecure |
10:30 am - 11:00 am | Morning Break |
11:00 am - 12:30 pm | Session 1: Binary Analysis and Security Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture Xiaochuan Zhang (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology), Wenjie Sun (State Key Laboratory of Mathematical Engineering and Advanced Computing), Jianmin Pang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Fudong Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Zhen Ma (State Key Laboratory of Mathematical Engineering and Advanced Computing) o-glassesX: Compiler Provenance Recovery with Attention Mechanism from a Short Code Fragment Yuhei Otsubo (National Police Agency, Tokyo, Japan), Akira Otsuka (Institute of information Security, Japan), Mamoru Mimura (National Defense Academy, Japan), Takeshi Sakaki (The University of Tokyo, Japan), Hiroshi Ukegawa (National Police Agency, Tokyo, Japan) Creating Human Readable Path Constraints from Symbolic Execution Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories) Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg) |
12:30 pm - 1:30 pm | Lunch |
1:30 pm - 2:40 pm | Session 2: Analyzing Difficult Targets It Doesn’t Have to Be So Hard: Efficient Symbolic Reasoning for CRC Vaibhav Sharma (University of Minnesota), Navid Emamdoost (University of Minnesota), Seonmo Kim (University of Minnesota), Stephen McCamant (University of Minnesota) A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly Yu-Jye Tung (University of California, Irvine), Ian Harris (University of California Irvine) QSynth - A Program Synthesis based approach for Binary Code Deobfuscation Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona) |
2:40 pm - 3:00 pm | Invited Demo: Analyzing obfuscated binaries with QSynth Robin David (Quarkslab) |
3:00 pm - 3:30 pm | Afternoon Break |
3:30 pm - 4:00 pm | Invited Talk: IoT Platform Fuzzing Jacopo Corbetta (Qualcomm) |
4:00 pm - 4:30 pm | Invited Talk: The State of Firmware Analysis Eric Gustafson (UC Santa Barbara) |
4:30 pm - 5:00 pm | Invited Talk: From Zero to Hero: Bootstrapping Students into Binary Analysis Yan Shoshitaishvili (Arizona State University) |