University of Minnesota
Binary Reverse Engineering


All of the papers listed here should be available free-of-charge to UMN students. To access libraries-licensed content from off campus, you can use the library's proxy service and bookmarklet.

  • For March 16th 18th:
    Matthias Wenzl, Georg Merzdovnik, Johanna Ullrich, and Edgar Weippl. “From Hack to Elaborate Technique -- A Survey on Binary Rewriting”. In ACM Computing Surveys, 52:3 article 49, July 2019.
  • For March 23rd:
    Erick Bauman, Zhiqiang Lin, and Kevin W. Hamlen. “Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics” in Network and Distributed Systems Security (NDSS) Symposium, February 2018.
    [ISOC] [Author's copy]
  • For March 25th:
    Shuai Wang, Pei Wang, and Dinghao Wu. “Reassembleable Disassembling”. In USENIX Security Symposium, August 2015.
  • For March 30th:
    Dennis Andriesse, Asia Slowinska, and Herbert Bos. “Compiler-Agnostic Function Detection in Binaries”. In IEEE European Symposium on Security and Privacy (EuroS&P), April 2017.
    [IEEE Xplore] [Author's copy]
  • For April 1st:
    Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, and Matthew Smith. “No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations”. In Network and Distributed Systems Security (NDSS) Symposium, February 2015.
  • For April 6th:
    Juan Caballero and Zhiqiang Lin. “Type Inference on Executables”. In ACM Computing Surveys, 48:4 article 65, May 2016.
  • For April 8th:
    Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, and Matthew Smith. “Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study”. In IEEE Symposium on Security and Privacy (Oakland), May 2016.
  • For April 13th:
    Máté Horváth and Levente Buttyán. “The Birth of Cryptographic Obfuscation”. In Cryptology ePrint Archive, updated January 2018. Concentrate on sections 1-3.
  • For April 15th:
    Louis Goubin, Pascal Paillier, Matthieu Rivain, and Junwei Wang. “How to reveal the secrets of an obscure white-box implementation”. In Journal of Cryptographic Engineering, April 2019.
  • For April 20th:
    Eric Schulte, Jason Ruchti, Matt Noonan, David Ciarletta, and Alexey Loginov. “Evolving Exact Decompilation”. In Workshop on Binary Analysis Research (BAR), February 2019.
  • For April 22nd:
    Jeremy Lacomis, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. “DIRE: A Neural Approach to Decompiled Identifier Renaming”. In Conference on Automated Software Engineering (ASE), November 2019.
  • For April 27th:
    Niranjan Hasabnis and R. Sekar. “Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers”. In Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2016.

Bonus papers

It's looking more likely that we won't cover these papers for lack of time:

  • Matthew Noonan, Alexey Loginov, and David Cok. “Polymorphic Type Inference for Machine Code”. In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), July 2016.
    [ACM] [arXiv]