publication . Preprint . Conference object . 2019

DIRE: A Neural Approach to Decompiled Identifier Naming

Jeremy Lacomis; Pengcheng Yin; Edward Schwartz; Miltiadis Allamanis; Claire Le Goues; Graham Neubig; Bogdan Vasilescu;
Open Access English
  • Published: 19 Sep 2019
Abstract
Comment: 2019 International Conference on Automated Software Engineering
Subjects
free text keywords: Computer Science - Software Engineering
Funded by
NSF| SHF: Small: Open-domain, Data-driven Code Synthesis from Natural Language
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 1815287
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computing and Communication Foundations
43 references, page 1 of 3

[1] K. Yakdan, S. Eschweiler, E. Gerhards-Padilla, and M. Smith, “No more gotos: Decompilation using pattern-independent control-flow structuring and semantics-preserving transformations,” in Network and Distributed System Security Symposium, ser. NDSS '15, 2015.

[2] K. Yakdan, S. Dechand, E. Gerhards-Padilla, and M. Smith, “Helping Johnny to analyze malware: A usability-optimized decompiler and malware analysis user study,” in IEEE Symposium on Security and Privacy, ser. SP '16, 2016, pp. 158-177.

[3] L. Durfina, J. Kroustek, and P. Zemek, “PsybOt malware: A stepby-step decompilation case study,” in Working Conference on Reverse Engineering, ser. WCRE '13, 2013, pp. 449-456. [OpenAIRE]

[4] M. J. van Emmerik, “Static single assignment for decompilation,” Ph.D. dissertation, University of Queensland, 2007.

[5] E. J. Schwartz, J. Lee, M. Woo, and D. Brumley, “Native x86 decompilation using semantics-preserving structural analysis and iterative controlflow structuring,” in USENIX Security Symposium, ser. USENIXSEC '13, 2013, pp. 353-368.

[6] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet: Analysis of a botnet takeover,” in ACM Conference on Computer and Communications Security, ser. CCS '09, November 2009. [OpenAIRE]

[7] “Uroburos: Highly complex espionage software with Russian roots,” G Data SecurityLabs, Tech. Rep., 2014.

[8] C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, D. Plohmann, C. J. Dietrich, and H. Bos, “SoK: P2PWNED - Modeling and evaluating the resilience of peer-to-peer botnets,” in Symposium on Security and Privacy, ser. SOSP '13, 2013, pp. 97-111.

[9] Binutils. (2019) objdump. [Online]. Available: https://www.gnu.org/ software/binutils/

[10] IDA. (2019) Ida. [Online]. Available: https://www.hex-rays.com/ products/ida/

[11] Hex-Rays. (2019) The hex-rays decompiler. [Online]. Available: https://www.hex-rays.com/products/decompiler/

[12] Ghidra. (2019) The ghidra decompiler. [Online]. Available: https: //ghidra-sre.org/

[13] E. M. Gellenbeck and C. R. Cook, “An investigation of procedure and variable names as beacons during program comprehension,” Oregon State University, Tech. Rep., 1991.

[14] D. Lawrie, C. Morrell, H. Feild, and D. Binkley, “What's in a name? A study of identifiers,” in International Conference on Program Comprehension, ser. ICPC '06, 2006, pp. 3-12.

[15] A. Hindle, E. T. Barr, Z. Su, M. Gabel, and P. Devanbu, “On the naturalness of software,” in Proc. International Conference on Software Engineering (ICSE). IEEE, 2012, pp. 837-847.

43 references, page 1 of 3
Abstract
Comment: 2019 International Conference on Automated Software Engineering
Subjects
free text keywords: Computer Science - Software Engineering
Funded by
NSF| SHF: Small: Open-domain, Data-driven Code Synthesis from Natural Language
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 1815287
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computing and Communication Foundations
43 references, page 1 of 3

[1] K. Yakdan, S. Eschweiler, E. Gerhards-Padilla, and M. Smith, “No more gotos: Decompilation using pattern-independent control-flow structuring and semantics-preserving transformations,” in Network and Distributed System Security Symposium, ser. NDSS '15, 2015.

[2] K. Yakdan, S. Dechand, E. Gerhards-Padilla, and M. Smith, “Helping Johnny to analyze malware: A usability-optimized decompiler and malware analysis user study,” in IEEE Symposium on Security and Privacy, ser. SP '16, 2016, pp. 158-177.

[3] L. Durfina, J. Kroustek, and P. Zemek, “PsybOt malware: A stepby-step decompilation case study,” in Working Conference on Reverse Engineering, ser. WCRE '13, 2013, pp. 449-456. [OpenAIRE]

[4] M. J. van Emmerik, “Static single assignment for decompilation,” Ph.D. dissertation, University of Queensland, 2007.

[5] E. J. Schwartz, J. Lee, M. Woo, and D. Brumley, “Native x86 decompilation using semantics-preserving structural analysis and iterative controlflow structuring,” in USENIX Security Symposium, ser. USENIXSEC '13, 2013, pp. 353-368.

[6] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet: Analysis of a botnet takeover,” in ACM Conference on Computer and Communications Security, ser. CCS '09, November 2009. [OpenAIRE]

[7] “Uroburos: Highly complex espionage software with Russian roots,” G Data SecurityLabs, Tech. Rep., 2014.

[8] C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, D. Plohmann, C. J. Dietrich, and H. Bos, “SoK: P2PWNED - Modeling and evaluating the resilience of peer-to-peer botnets,” in Symposium on Security and Privacy, ser. SOSP '13, 2013, pp. 97-111.

[9] Binutils. (2019) objdump. [Online]. Available: https://www.gnu.org/ software/binutils/

[10] IDA. (2019) Ida. [Online]. Available: https://www.hex-rays.com/ products/ida/

[11] Hex-Rays. (2019) The hex-rays decompiler. [Online]. Available: https://www.hex-rays.com/products/decompiler/

[12] Ghidra. (2019) The ghidra decompiler. [Online]. Available: https: //ghidra-sre.org/

[13] E. M. Gellenbeck and C. R. Cook, “An investigation of procedure and variable names as beacons during program comprehension,” Oregon State University, Tech. Rep., 1991.

[14] D. Lawrie, C. Morrell, H. Feild, and D. Binkley, “What's in a name? A study of identifiers,” in International Conference on Program Comprehension, ser. ICPC '06, 2006, pp. 3-12.

[15] A. Hindle, E. T. Barr, Z. Su, M. Gabel, and P. Devanbu, “On the naturalness of software,” in Proc. International Conference on Software Engineering (ICSE). IEEE, 2012, pp. 837-847.

43 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue