Workshop on Binary Analysis Research (BAR) 2020 at NDSS

Preprints of accepted papers and artifacts

The official workshop proceedings will be published after the workshop.
Please find below all preprints of the accepted papers and links to released research artifacts.

Title Preprint Artifacts Slides
o-glassesX: Compiler Provenance Recovery with Attention Mechanism from a Short Code Fragment PDF GitHub PDF
Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture PDF GitHub PPTX
Creating Human Readable Path Constraints from Symbolic Execution PDF GitHub PDF PPTX
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution PDF GitHub PDF
It Doesn’t Have to Be So Hard: Efficient Symbolic Reasoning for CRC PDF GitHub PDF
A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly PDF GitHub (tool)
GitHub (evaluation)
PDF
QSynth - A Program Synthesis based approach for Binary Code Deobfuscation PDF GitHub PDF

Updated programme

Time Item
9:20 am - 9:30 am Welcome and Opening Remarks
9:30 am - 10:30 am Keynote: The hard things about analyzing 1’s and 0’s...
Dr. David Brumley, Carnegie Mellon University - ForAllSecure
10:30 am - 11:00 am Morning Break
11:00 am - 12:30 pm Session 1: Binary Analysis and Security

Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture
Xiaochuan Zhang (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology), Wenjie Sun (State Key Laboratory of Mathematical Engineering and Advanced Computing), Jianmin Pang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Fudong Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Zhen Ma (State Key Laboratory of Mathematical Engineering and Advanced Computing)

o-glassesX: Compiler Provenance Recovery with Attention Mechanism from a Short Code Fragment
Yuhei Otsubo (National Police Agency, Tokyo, Japan), Akira Otsuka (Institute of information Security, Japan), Mamoru Mimura (National Defense Academy, Japan), Takeshi Sakaki (The University of Tokyo, Japan), Hiroshi Ukegawa (National Police Agency, Tokyo, Japan)

Creating Human Readable Path Constraints from Symbolic Execution
Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories)

Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
12:30 pm - 1:30 pm Lunch
1:30 pm - 2:40 pm Session 2: Analyzing Difficult Targets

It Doesn’t Have to Be So Hard: Efficient Symbolic Reasoning for CRC
Vaibhav Sharma (University of Minnesota), Navid Emamdoost (University of Minnesota), Seonmo Kim (University of Minnesota), Stephen McCamant (University of Minnesota)

A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly
Yu-Jye Tung (University of California, Irvine), Ian Harris (University of California Irvine)

QSynth - A Program Synthesis based approach for Binary Code Deobfuscation
Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)
2:40 pm - 3:00 pm Invited Demo: Analyzing obfuscated binaries with QSynth
Robin David (Quarkslab)
3:00 pm - 3:30 pm Afternoon Break
3:30 pm - 4:00 pm Invited Talk: IoT Platform Fuzzing
Jacopo Corbetta (Qualcomm)
4:00 pm - 4:30 pm Invited Talk: The State of Firmware Analysis
Eric Gustafson (UC Santa Barbara)
4:30 pm - 5:00 pm Invited Talk: From Zero to Hero: Bootstrapping Students into Binary Analysis
Yan Shoshitaishvili (Arizona State University)