• Publications
  • Influence
Rendezvous: A search engine for binary code
The problem of matching between binaries is important for software copyright enforcement as well as for identifying disclosed vulnerabilities in software. We present a search engine prototype calledExpand
  • 80
  • 10
  • Open Access
Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families
We developed a framework for abstracting, aligning and analysing malware execution traces and performed a preliminary exploration of state of the art phylogenetic methods, whose strengths lie inExpand
  • 13
  • 1
  • Open Access
Polymorphic Attacks against Sequence-based Software Birthmarks
Sequence alignment algorithms have recently found a use in detecting code clones, software plagiarism, code theft, and polymorphic malware. This approach involves extracting birthmarks, in this caseExpand
  • 10
  • Open Access
Decompilation as search
Decompilation is the process of converting programs in a low-level representation, such as machine code, into high-level programs that are human readable, compilable and semantically equivalent. TheExpand
  • 10
  • Open Access
Hunting for vulnerabilities in large software : the OpenOffice suite
How much effort does it cost to find zero-day vulnerabilities in widely-deployed software? As an exercise, we searched for vulnerabilities in OpenOffice, a productivity suite used by about a hundredExpand
  • 6