Compiler optimization is the most common source contributing to binarycode differences in syntax . We tailor search-basediterative compilation for the auto-tuning of binary code differences . We run BinTuner with GCC 10.2and LLVM 11.0 on SPEC benchmarks (CPU2006 & CPU2017), Coreutils, and OpenSSL . Our findings paint acautionary tale for security analysts that attackers have a new way to mutatemalware code cost-effectively, and the research community needs to step back toreassess optimization-resistance evaluations, the authors say . In addition, the detection rate of the IoTmalware variants tuned by Bin tuner falls by more than 50% in addition to the detection rates of those tuned by binTuner fall by over 50% of those tuning by the tool . The research community must step back to analyzing the analysis of these tools’ comparisons. Our findings painted acutionary tale to security analysts for the security analysts, the researchers say. In fact, our findings paint a new story for security experts to be cautious about using these tools as a tool that could be used by attackers

Author(s) : Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li

Links : PDF - Abstract

Code :
Coursera

Keywords : security - findings - optimization - analysts - code -

Leave a Reply

Your email address will not be published. Required fields are marked *