A nonexhaustive list of my favorite papers, have fun!
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask
Detecting Code Clones in Binary Executables
A Novel Disassemble Algorithm Designed for Malicious File
Towards Optimal Use of Exception Handling Information for Function Detection
Statistical Reconstruction of Class Hierarchies in Binaries
String Analysis for x86 Binaries
Disassembly of Executable Code Revisited
Recovering C++ Objects From Binaries Using Inter-Procedural Data-Flow Analysis
Binary Recompilation via Dynamic Analysis and the Protection of Control and Data-flows therein
Alias Analysis of executable code
Generalized Vulnerability Extrapolation using Abstract Syntax Trees
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Type Analysis of Low-level Code
TIE: Principled Reverse Engineering of Types in Binary Programs
Efficient Features for Function Matching between Binary Executables
Testing Intermediate Representations for Binary Analysis
Equational Reasoning on x86 Assembly Code
GDSL: A Generic Decoder Specification Language for Interpreting Machine Language
Dynamically Translating x86 to LLVM using QEMU
MENTALESE - An Architecture-Agnostic Analysis Framework for Binary Executables
Practical Dynamic Reconstruction of Control Flow Graphs
How to write a basic control flow decompiler
Notes on Graph Algorithms Used in Optimizing Compilers
A Usability-Optimized Decompiler and Malware Analysis User Study
Sound C Code Decompilation for a subset of x86-64 Binaries
Design of an Automatically Generated Retargetable Decompiler
decompiler internals: microcode
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis
DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types
dewolf: Improving Decompilation by leveraging User Surveys -- github
Decomperson: How Humans Decompile and What We Can Learn From It
Augmenting Decompiler Output with Learned Variable Names and Types
Breaking Down Binary Ninjas Low Level IL
fcd - An optimizing decompiler
A Tutorial on Software Obfuscation
Slides: The Next Generation of Virtualization-based Obfuscators
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation https://www.youtube.com/watch?v=MRku-2fW42w
On Symbolic Execution of Decompiled Programs
How to Kill Symbolic Deobfuscation for Free
PyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis
Practical Symbolic Execution and SATisfiability Module Theories (SMT) 101
(Reven:) Updated Analysis of PatchGuard on Microsoft Windows 10 RS4
Dynamic Binary Instrumentation Primer
A Survey of Symbolic Execution Techniques
Enabling Sophisticated Analyses of x86 Binaries with RevGen
Reasoning about Software Security via Synthesized Behavioral Substitutes
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
Code deobfuscation by program synthesis-aided simplification of Mixed Boolean-Arithmetic expressions
QSynth - A Program Synthesis based Approach for Binary Code Deobfuscation
Souper: A Synthesizing Superoptimizer
STOKE: stochastic superoptimization
Obfuscation with MBA Expression: Reconstruction, Analyse and Simplification
Program Synthesis in Reverse Engineering
(!)(Xyntia)Search-based Approaches for Local Blackbox Deobfuscation Understand, Improve and Mitigate
AI-based Blackbox Code Deobfuscation Understand, Improve and Mitigate
Efficient Deobfuscation of Linear Mixed Boolean-Arithmetic Expressions
NeuReduce: Reducing Mixed Boolean-Arithmetic Expressions by Recurrent Neural Network
Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions
Improving MBA Deobfuscation using Equality Saturation
LOKI : Hardening Code Obfuscation Against Automated Attacks loki link
Automatic Deobfuscation and Reverse Engineering of Obfuscated Code
VMAttack: Deobfuscating Virtualization-Based Packed Binaries
Behavioral Analysis of Obfuscated Code https://www.youtube.com/watch?v=aYQ4TIcGD2o
Introduction to Modern Code Virtualization by Nooby
Seeing through obfuscation: interactive detection and removal of opaque predicates
Symbolic deobfuscation: from virtualized code back to the original
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification
NISLVMP: Improved Virtual Machine-Based Software Protection
Replacement Attacks Against VM-protected Applications (process level)
https://github.com/JeremyWildsmith/x86devirt
Playing with Binary Analysis - Deobfuscation of VM based software protection
Advanced Binary Deobfuscation + The Art of De-obfuscation
modern malware threat: HANDLING OBFUSCATED CODE
Sys: a Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
Automatic Heap Layout Manipulation for Exploitation
Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
Identifying and Exploiting Windows Kernel Race Conditions via Memory Access Patterns
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels
T-Fuzz: fuzzing by program transformation
Tracing Privileged Memory Accesses to Discover Software Vulnerabilities
Static detection of C++ vtable escape vulnerabilities in binary code
FIRMWIRE: Transparent Dynamic Analysis for Cellular Baseband Firmware
HYPER-CUBE : High-Dimensional Hypervisor Fuzzing https://www.youtube.com/watch?v=GmIlLKT_nH8
NYX : Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs
Weird machines, exploitability, and provable unexploitability
Everything Old is New Again: Binary Security of WebAssembly
Reverse Engineering WebAssembly
Learning to Find Usages of Library Functions in Optimized Binaries
B2R2: Building an Efficient Front-End for Binary Analysis
An Exploratory Analysis of Microcode as a Building Block for System Defenses
Reverse code engineering of .NET applications
Exploring Widevine for Fun and Profit
Android: deep dive inside anti-reverse & universal bypass with Frida
THE FAKE CISCO Hunting for backdoors in Counterfeit Cisco devices
Remote Exploitation of an Unaltered Passenger Vehicle
Reverse Engineering of Intel Microcode Update Structure
Americas Global Retreat and the Ensuing Strategic Vacuum
Hezbollah Finance in Lebanon: A Primary-Source Review
Festering Grievances and the Return to Arms in Southern Syria
How Global Jihad Relocalises and Where it Leads. The Case of HTS, the Former AQ Franchise in Syria
Syria at the Center of Power Competition and Counterterrorism
Nowhere to Hide The Logic of Chemical Weapons Use in Syria
Islamic State recoilless launcher systems
Lebanese Hezbollahs Experience in Syria
A TALE OF SIX TRIBES Securing the Middle Euphrates River Valley
Adaptive Flight Control With Living Neuronal Networks on Microelectrode Arrays
ILK-Stellungnahme zur Wiederaufarbeitung abgebrannter Brennelemente
Transformation von elektrischer Energie in Wasserstoff und dessen Speicherung
Leaking Information Through Cache LRU States
Factoring 2 048 RSA integers in 177 days with 13 436 qubits and a multimode memory
Pig Chimeric Model with Human Pluripotent Stem Cells
Cure53 Browser Security White Paper
In vitro neurons learn and exhibit sentience when embodied in a simulated game-world
Organoid intelligence (OI): the new frontier in biocomputing and intelligence-in-a-dish
Biofortified tomatoes provide a new route to vitamin D sufficiency
Diploid hepatocytes drive physiological liver renewal in adult humans
Cerebral organoids at the air liquid interface generate diverse nerve tracts with functional output
Mapping information-rich genotype-phenotype landscapes with genome-scale Perturb-seq
Post-gastrulation synthetic embryos generated exutero from mouse naive ESC
Comparative genomics of mortal and immortal cnidarians unveils novel keys behind rejuvenation
In vitro neurons learn and exhibit sentience when embodied in a simulated game-world
DNA Damage, DNA Repair, Aging, and Neurodegeneration
HCN2 Rescues brain defects by enforcing endogenous voltage pre-patterns
Bioelectric signaling: Reprogrammable circuits underlying embryogenesis, regeneration, and cancer