-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Papers using the Unicorn emulator
-
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics, Computers & Security Volume 962
-
BaseSAFE: Baseband SAnitized Fuzzing through Emulation, arXiv:2005.07797, 2020,
-
Efficient Binary-Level Coverage Analysis, ESEC/FSE 2020. (Source code)
-
Scalable Translation Validation of Unverified Legacy OS Code, FMCAD 2019.
-
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes, COMPSAC 2019.
-
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics, NDSS 2019. (Source code)
-
Side-Channel assessment of Open Source Hardware Wallets, Arxiv.org 2019.
-
Fast SystemC Processor Models with Unicorn, Rapido 2019.
-
Static Analysis of ROP Code , EuroSec 2019. (Source code) (PDF)
-
Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing, WOOT 2019. (Source code)
-
HookTracer: A System for Automated and Accessible API Hooks Analysis, DFRWS 2019.
-
Understanding Linux Malware, IEEE Security & Privacy 2018.
-
Automation of white-box cryptography attacks in Android applications, Master thesis 2018.
-
Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation, IEEE Transactions on Software Engineering 2018.
-
Syntia: Synthesizing the Semantics of Obfuscated Code, Usenix Security 2017. (Source code)
-
An Improved Method to Unveil Malware’s Hidden Behavior, Inscrypt 2017.
-
Return-Oriented Programme Evolution with ROPER: A proof of concept, GECCO 2017.
-
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks, AsiaCCS 2016. (Source code)