TY - CHAP
T1 - Library Function Identification
AU - Alrabaee, Saed
AU - Debbabi, Mourad
AU - Shirani, Paria
AU - Wang, Lingyu
AU - Youssef, Amr
AU - Rahimian, Ashkan
AU - Nouh, Lina
AU - Mouheb, Djedjiga
AU - Huang, He
AU - Hanna, Aiman
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - Program binaries typically contain a significant amount of library functions taken from standard libraries or free open-source software packages. Automatically identifying such library functions not only enhances the quality and efficiency of threat analysis and reverse engineering tasks, but also improves their accuracy by avoiding false correlations between irrelevant code bases. Furthermore, such automation has a strong positive impact in other applications such as clone detection, function fingerprinting, authorship attribution, vulnerability analysis, and malware analysis.
AB - Program binaries typically contain a significant amount of library functions taken from standard libraries or free open-source software packages. Automatically identifying such library functions not only enhances the quality and efficiency of threat analysis and reverse engineering tasks, but also improves their accuracy by avoiding false correlations between irrelevant code bases. Furthermore, such automation has a strong positive impact in other applications such as clone detection, function fingerprinting, authorship attribution, vulnerability analysis, and malware analysis.
UR - http://www.scopus.com/inward/record.url?scp=85080874394&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85080874394&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-34238-8_4
DO - 10.1007/978-3-030-34238-8_4
M3 - Chapter
AN - SCOPUS:85080874394
T3 - Advances in Information Security
SP - 79
EP - 99
BT - Advances in Information Security
PB - Springer
ER -