Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach
This program is tentative and subject to change.
Binary Software Composition Analysis (BSCA) is a technique for identifying the versions of third-party libraries (TPLs) used in compiled binaries, thereby tracing the dependencies and vulnerabilities of software components without access to their source code. However, existing BSCA techniques struggle with cross-language invoked C/C++ binaries in polyglot projects due to two key challenges: (1) interference from heterogeneous Foreign Function Interface (FFI) bindings that obscure distinctive TPL features and generate false positives during matching processes, and (2) the inherent complexity of composite binaries (fused binaries), particularly prevalent in polyglot development where multiple TPLs are frequently compiled into single executable units, resulting in blurred boundaries between libraries and substantially compromising version identification precision.
We propose \textsc{DeeperBin}, a BSCA technique that addresses these challenges through a high-quality, large-scale feature database with four key advantages: (1) high scalability that is capable of analyzing 74,647 C/C++ TPL versions, (2) efficient noise filtering to remove FFI bindings and common functions, (3) automated extraction of version string regexes for 31,855 TPL versions, and (4) generation of distinctive version features using the \emph{Minimum Description Length} (MDL) principle. Evaluated on 418 cross-language binaries, \textsc{DeeperBin} achieves 81.2% precision and 84.6% recall for TPL detection, outperforming state-of-the-art (SOTA) techniques by 14.4% and 23.2%, respectively. For version identification, it achieves 70.3% precision, a 12.6% improvement over state-of-the-art techniques. Ablation studies confirm the usefulness of FFI filtering and MDL-based features, boosting precision and recall by 17.1% and 18.8%. \textsc{DeeperBin} also maintains competitive efficiency, processing binaries in 364.3 seconds while supporting the largest feature database.
This program is tentative and subject to change.
Wed 19 NovDisplayed time zone: Seoul change
11:00 - 12:30 | |||
11:00 10mTalk | When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion Research Papers Taeyoung Kim Sungkyunkwan University, Sanghak Oh Sungkyunkwan University, Kiho Lee ETRI (Electronics and Telecommunications Research Institute), South Korea, Weihang Wang University of Southern California, Yonghwi Kwon University of Maryland, Sanghyun Hong Oregon State University, Hyoungshick Kim Sungkyunkwan University | ||
11:10 10mTalk | RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications Research Papers Mingwei Zheng Purdue University, Chengpeng Wang Purdue University, Xuwei Liu Purdue University, USA, Jinyao Guo Purdue University, Shiwei Feng Purdue University, Xiangyu Zhang Purdue University | ||
11:20 10mTalk | Time to separate from StackOverflow and match with ChatGPT for encryption Journal-First Track | ||
11:30 10mTalk | Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach Research Papers Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, Wei Tang HUA WEI, Xian Zhan HUA WEI, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
11:40 10mTalk | Detecting Various DeFi Price Manipulations with LLM Reasoning Research Papers Juantao Zhong Lingnan University, Daoyuan Wu Lingnan University, Ye Liu Singapore Management University, Maoyi Xie Nanyang Technological University, Yang Liu Nanyang Technological University, Yi Li Nanyang Technological University, Ning Liu City University of Hong Kong | ||
11:50 10mTalk | Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces Research Papers Yi Qian State Key Laboratory for Novel Software Technology, Nanjing University, Pengfei State Key Laboratory for Novel Software Technology, Nanjing University, Hao Wu , Ligeng Chen Honor Device Co., Ltd, Bing Mao Nanjing University | ||
12:00 10mTalk | CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses Research Papers | ||
12:10 10mTalk | A Large Scale Study of AI-based Binary Function Similarity Detection Techniques for Security Researchers and Practitioners Research Papers Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Chinese Academy of Sciences, Yuekang Li UNSW, Zhengzi Xu Imperial Global Singapore, Sihao Qiu Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Chi Zhang Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Keyu Qi Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
12:20 10mTalk | FirmProj: Detecting Firmware Leakage in IoT Update Processes via Companion App Analysis Research Papers Wenzhi Li Shandong University, Jialong Guo Shandong University, Jiongyi Chen National University of Defense Technology, Fan Li Shandong University, Yujie Xing Shandong University, Yanbo Xu Shanghai Jiao Tong University, Shishuai Yang Shandong University, Wenrui Diao Shandong University | ||