sureworkshop Profile Banner
ACM SURE Workshop Profile
ACM SURE Workshop

@sureworkshop

Followers
97
Following
1
Media
24
Statuses
65

The Workshop on Software Understanding and Reverse Engineering (SURE). Co-located at ACM CCS 2025 in Taiwan on October 13th.

ACM CCS 2025 (Taiwan)
Joined April 2025
Don't wanna be here? Send us removal request.
@sureworkshop
ACM SURE Workshop
7 months
We are excited to announce that the 1st Workshop on Software Understanding and Reverse Engineering (SURE) will be co-located at ACM CCS 2025 in Taiwan! We invite the community to submit their awesome research https://t.co/8RTLR383kw. So, what is SURE? More in the 🧵
1
10
28
@sureworkshop
ACM SURE Workshop
1 month
@moyix Finally, stay in touch. We have an associated Discord (unorthodox, we know) to connect academics and practitioners: https://t.co/xPA9o2HSKw In fact, some of the attendees this year only made it due to the outreach on Discord. Come and chat!
discord.com
The Workshop on Software Understanding and Reverse Engineering (SURE), hosting conversations on associated topics. From decompilation to source visualization, find them under the SURE umbrella. | 282
0
1
1
@sureworkshop
ACM SURE Workshop
1 month
@moyix Also, go read some of the papers: https://t.co/4e4NFH5wpv Keep, a lookout for our executive summary of papers/discussions/conclusions at SURE 2025 for those who could not attend IRL. We will post it in the coming days.
sure-workshop.org
Papers and posters accepted for SURE 2025
1
1
3
@sureworkshop
ACM SURE Workshop
1 month
CCS has come to a close, and so has the first-ever SURE Workshop. We want to thank the authors, the PC, @moyix, our panel, and CCS for making SURE a success. We felt the support for this research area (the room was packed out for more than half the day). See you all next year!
1
1
5
@sureworkshop
ACM SURE Workshop
1 month
Check out the paper: https://t.co/fPqHtZih8F
0
0
0
@sureworkshop
ACM SURE Workshop
1 month
In the special sub-area of type inferencing on binary code, Noriki's work explores the recovery of structs and how different GNN architectures may have better performance.
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
On our last presented work at SURE, we have Noriki Sakamoto presenting "Toward Inferring Structural Semantics from Binary Code Using Graph Neural Networks"
1
0
3
@sureworkshop
ACM SURE Workshop
1 month
Check out the paper: https://t.co/UEWwvK1bzg
0
0
0
@sureworkshop
ACM SURE Workshop
1 month
Indeed, LibIHT is more robust. They achieve better results on binaries that attempt to evade their analysis.
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
The magic happens at the kernel level. Their new tool LibIHT ( https://t.co/8x8JEgM674), is implemented both at the user-space and kernel-space level. This is important for speed and robustness against evasion techniques.
Tweet card summary image
github.com
Intel Hardware Trace Library - Kernel Space Componment - libiht/libiht
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
Often, when static analysis tools do not work, you need to get down in the weeds of a program and start dynamically analyzing it. In Thomason's work, he explores a way to be more robust and efficient by utilizing hardware features for dynamic analysis.
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
We're so back, and on our last session: Applications & Future Work. Changyu "Thomason" Zhao is presenting "LibIHT: A Hardware-Based Approach to Efficient and Evasion-Resistant Dynamic Binary Analysis". He is presenting virtually.
1
1
9
@sureworkshop
ACM SURE Workshop
1 month
Find the paper here: https://t.co/8NIhOkDP1v
0
0
0
@sureworkshop
ACM SURE Workshop
1 month
Now, you got your crazy code, how do you select which functions in the code to obfuscate and evaluate on? Functions must be "sensitive" and "central". Sensitive: has sensitive info like a uid or gid or a password. Central: many other functions should depend on it (calls).
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
Real world programs in their set need: - unique functionality - complex code - ... Some real programs: OpenSSL, QEMU, SQLite, curl, ... all difficult targets that are already hard to analyze, so they are not obfuscated.
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
An interesting observation: obfuscation is really expensive on the CPU. Real programs don't obfuscate the entire program; they only obfuscate critical code locations like license checks. So they construct their dataset with that in mind.
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
Dongpeng argues that many modern works in deobfuscation don't work on large complex programs. Instead, they are mostly tested on toy programs that are not real-world. To make a more useful evaluation, they explore how real obfuscation is used.
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
We're on our last talk of the session, remaining with the obfuscation topic. Dongpeng Xu is presenting "DEBRA: A Real-World Benchmark For Evaluating Deobfuscation Methods" in the place of Zheyun Feng.
1
1
1
@sureworkshop
ACM SURE Workshop
1 month
Interesting question: do specific features seem to matter more for the models? Example: constants. So far, the answer is unclear. These models are very black-box and require more explainability.
0
0
0
@sureworkshop
ACM SURE Workshop
1 month
Takeaways: - Training on obfuscation does help models, but it is not a silver bullet. This solution does not work well on obfuscation tech it has never seen before. Check out the work: https://t.co/808cSkntmc
1
0
0
@sureworkshop
ACM SURE Workshop
1 month
Some results: you train on obfuscation, and it turns out the model does do better (with BinShot) on obfuscated code. However, training it on specific types of obfuscation tech matters. For instance, training on control flow flattening may not help at all with MBA.
1
0
0