Reverse Engineering Binary Programs and Its Security Applications

This project aims to develop techniques to reverse engineer functionalities and data structures of binary executables without any symbolic information. It has many security applications. For example, understanding the functionality of code segments is critical to determining the existence of any hidden malicious logic; understanding the internal representation of critical data structures (e.g. the data structure for network connections in a browser) is key for forensic analysis.

Our contributions are highlighted as follows.

Funding

Binary Based Data Structure Reverse Engineering for Memory Forensics and Application Vulnerability Discovery, Northrop Grumman CyberSecurity Research Consortium, 2010-2011.
EAGER: Binary-based Data Structure Revelation for Memory Forensics, NSF-TC-1049303, 2010-2012.

Students

Publications

NDSS Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures ,
the 17th Network and Distributed System Security Symposium, 2011.

[abstract][pdf]
DSN Z. Lin, X. Zhang and D. Xu . Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and Attack Construction ,
the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2010.

[abstract][pdf]
NDSS Z. Lin, X. Zhang and D. Xu. Automatic Reverse Engineering of Data Structures from Binary Execution ,
the 17th Network and Distributed System Security Symposium, 2010.

[abstract][pdf]
FSE Z Lin and X. Zhang . Deriving Program Input Syntactic Structure from Execution ,
16th ACM SIGSOFT Symposium on Foundations of Software Engineering, 2008.

[abstract][pdf]
DSN Z. Lin, X. Zhang, and D. Xu . Convicting Remote Exploitable Vulnerabilities: An Efficient Input Provenance Based Approach ,
IEEE/IFIP International Conference on Dependable Systems and Networks, 2008.

[abstract][pdf]
NDSS Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution ,
Network and Distributed System Security Symposium, 2008.

[abstract][pdf]