Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis
نویسندگان
چکیده
Reverse engineering is the process of understanding inner working a software system without having source code. It critical for firmware security validation, vulnerability research, and malware analysis. However, it often requires significant amount manual effort. Recently, data-driven solutions were proposed to reduce effort by identifying code clones on assembly or level. analysts still have understand matched develop an functionality, assumed that such candidate always exists. This research bridges gap introducing problem summarization. Given as input, we propose machine-learning-based can produce human-readable summarizations functionalities in context We generate first function summary dataset leverage encoder-decoder architecture. With attention mechanism, possible what aspects had largest impact generating summary. Our experiment shows solution achieves high accuracy Bilingual Evaluation Understudy (BLEU) score. Finally, performed case studies real-life CVE cases better method’s performance practical implications.
منابع مشابه
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol/Internet Protocol (TCP/IP) [1] suite is a very widely used technique that is employed to interconnect computing facilities in modern network environments. However, there exist several security vulnerabilities in the TCP speci cation and additional weaknesses in a number of widely-available implementations of TCP. These vulnerabilities may enable an intruder to ...
متن کاملDesign-for-assembly (dfa) by Reverse Engineering . Design-for-assembly (dfa) by Reverse Engineering
`Design-for-Assembly (DFA)" is an engineering concept concerned with improving product designs for easier and less costly assembly operations. Much of academic or industrial eeorts in this area have been devoted to the development of analysis tools for measuring the \assemblability" of a design. On the other hand, little attention has been paid to the actual redesign process. The goal of this p...
متن کاملDynamic Reverse Code Generation for Backward Execution
The need for backward execution in debuggers has been raised a number of times. Backward execution helps a user naturally think backwards and, in turn, easily locate the cause of a bug. Backward execution has been implemented mostly by state-saving or checkpointing, which are inherently not scalable. In this paper, we present a method to generate reverse code, so that backtracking can be perfor...
متن کاملSafety Analysis of C Code through Reverse Engineering background
Software is increasingly making its way into embedded devices in missionand safety-critical domains such as the automotive, avionics or railway industry. Assessing and managing the risk that is inherent in software realizing safety-critical control functions is a key requirement in engineering hybrid systems. This case study reports on a solution carried out to perform fault analysis and critic...
متن کاملIdentifying Malicious Code Through Reverse Engineering
New updated! The latest book from a very famous author finally comes out. Book of identifying malicious code through reverse engineering, as an amazing reference becomes what you need to get. What's for is this book? Are you still thinking for what the book is? Well, this is what you probably will get. You should have made proper choices for your better life. Book, as a source that may involve ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital threats
سال: 2023
ISSN: ['2692-1626', '2576-5337']
DOI: https://doi.org/10.1145/3592623