Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 172 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 34 tok/s Pro
GPT-5 High 40 tok/s Pro
GPT-4o 100 tok/s Pro
Kimi K2 198 tok/s Pro
GPT OSS 120B 436 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

Call graph discovery in binary programs from unknown instruction set architectures (2401.07565v1)

Published 15 Jan 2024 in cs.CR and cs.SE

Abstract: This study addresses the challenge of reverse engineering binaries from unknown instruction set architectures, a complex task with potential implications for software maintenance and cyber-security. We focus on the tasks of detecting candidate call and return opcodes for automatic extraction of call graphs in order to simplify the reverse engineering process. Empirical testing on a small dataset of binary files from different architectures demonstrates that the approach can accurately detect specific opcodes under conditions of noisy data. The method lays the groundwork for a valuable tool for reverse engineering where the reverse engineer has minimal a priori knowledge of the underlying instruction set architecture.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (14)
  1. Arm a-profile a64 instruction set architecture. https://developer.arm.com/documentation/ddi0602/2023-03/Base-Instructions/BL--Branch-with-Link-?lang=en.
  2. Mips reference sheet. https://uweb.engr.arizona.edu/~ece369/Resources/spim/MIPSReference.pdf.
  3. On application of one-class svm to reverse engineering-based hardware trojan detection. In Fifteenth International Symposium on Quality Electronic Design, pages 47–54. IEEE, 2014.
  4. Reverse engineering of binary programs for custom virtual machines. In ReCon 2012, 2012.
  5. John Clemens. Automatic classification of object code using machine learning. Digital Investigation, 14:S156–S162, 2015.
  6. Wikimedia Commons. Executable and linkable format. https://en.wikipedia.org/wiki/Executable_and_Linkable_Format. File: ELF-layout--en.svg.
  7. Hardware reverse engineering: Overview and open challenges. 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017.
  8. Isadetect: Usable automated detection of cpu architecture and endianness for executable binary files and object code. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pages 376–380, 2020.
  9. Johannes Kinder. Towards static analysis of virtualization-obfuscated binaries. In 2012 19th Working Conference on Reverse Engineering, pages 61–70. IEEE, 2012.
  10. Identifying functions in binary code with reverse extended control flow graphs. Journal of Software: Evolution and Process, 27(10):793–820, 2015.
  11. Automatic reverse engineering of malware emulators. In 2009 30th IEEE Symposium on Security and Privacy, pages 94–109. IEEE, 2009.
  12. Design of high performance MIPS cryptography processor based on T-DES algorithm. CoRR, abs/1503.03166, 2015. File: MIPS-instruction-Type.png.
  13. An observational investigation of reverse engineers’ process and mental models. Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019.
  14. VMHunt: A verifiable approach to partially-virtualized binary code simplification. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 442–458, 2018.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.