In fact, some of the attendees this year only made it due to the outreach on Discord. Come and chat!
In fact, some of the attendees this year only made it due to the outreach on Discord. Come and chat!
sure-workshop.org/pa...
Keep, a lookout for our executive summary of papers/discussions/conclusions at SURE 2025 for those who could not attend IRL. We will post it in the coming days.
sure-workshop.org/pa...
Keep, a lookout for our executive summary of papers/discussions/conclusions at SURE 2025 for those who could not attend IRL. We will post it in the coming days.
sure-workshop.org/ac...
sure-workshop.org/ac...
sure-workshop.org/ac...
sure-workshop.org/ac...
This is important for speed and robustness against evasion techniques.
This is important for speed and robustness against evasion techniques.
In Thomason's work, he explores a way to be more robust and efficient by utilizing hardware features for dynamic analysis.
In Thomason's work, he explores a way to be more robust and efficient by utilizing hardware features for dynamic analysis.
sure-workshop.org/ac...
sure-workshop.org/ac...
Functions must be "sensitive" and "central". Sensitive: has sensitive info like a uid or gid or a password. Central: many other functions should depend on it (calls).
Functions must be "sensitive" and "central". Sensitive: has sensitive info like a uid or gid or a password. Central: many other functions should depend on it (calls).
- unique functionality
- complex code
- ...
Some real programs: OpenSSL, QEMU, SQLite, curl, ... all difficult targets that are already hard to analyze, so they are not obfuscated.
- unique functionality
- complex code
- ...
Some real programs: OpenSSL, QEMU, SQLite, curl, ... all difficult targets that are already hard to analyze, so they are not obfuscated.
So they construct their dataset with that in mind.
So they construct their dataset with that in mind.
To make a more useful evaluation, they explore how real obfuscation is used.
To make a more useful evaluation, they explore how real obfuscation is used.
So far, the answer is unclear. These models are very black-box and require more explainability.
So far, the answer is unclear. These models are very black-box and require more explainability.
- Training on obfuscation does help models, but it is not a silver bullet. This solution does not work well on obfuscation tech it has never seen before.
Check out the work:
sure-workshop.org/ac...
- Training on obfuscation does help models, but it is not a silver bullet. This solution does not work well on obfuscation tech it has never seen before.
Check out the work:
sure-workshop.org/ac...
They have a few questions, one interesting one is:
Does training on obfuscated code actually make the models better at reasoning on them?
They have a few questions, one interesting one is:
Does training on obfuscated code actually make the models better at reasoning on them?
Jiyong's work explores this idea in a measurable way.
Jiyong's work explores this idea in a measurable way.
Check out the paper:
sure-workshop.org/ac...
Check out the paper:
sure-workshop.org/ac...