Skip to main content

Under the Hood of Dr. Binary

key research papers behind Dr. Binary

Admin Admin avatar
Written by Admin Admin
Updated this week

Dr.Binary builds upon years of research in binary analysis, program analysis, and AI integration. Below is a representative list of foundational and directly related academic works:

  1. [ISSTA'25] Lian Gao and Heng Yin, BinDSA: Efficient, Precise Binary-Level Pointer Analysis with Context-Sensitive Heap Reconstruction, to appear in the ACM SIGSOFT International Symposium on Software Testing and Analysis, June 2025.

  2. [ISSTA'25] Xuezixiang Li, Sheng Yu, and Heng Yin, ALMOND: Learning an Assembly Language Model for 0-Shot Code Obfuscation Detection, to appear in the ACM SIGSOFT International Symposium on Software Testing and Analysis, June 2025.

  3. [USENIX Security'24] Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, and Heng Yin, SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution, in the 33rd USENIX Security Symposium, August 2024.

  4. [DSN'24] Sheng Yu, Wei Song, Xunchao Hu, and Heng Yin, On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach, in the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 2024. Distinguished Best Paper Award

  5. [ICSE'24] Jie Hu, Yue Duan, and Heng Yin, Marco: A Stochastic and Asynchronous Concolic Explorer, in the 46th International Conference on Software Engineering, April 2024.

  6. [NDSS'24] Lian Gao, Yu Qu, Sheng Yu, Yue Duan, and Heng Yin, SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing, in the Network and Distributed System Security Symposium, February 2024.

  7. [USENIX Security'22] Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyong Lee, Heng Yin, and Insik Shin, SymSan: Time and Space Efficient Concolic Execution via Dynamic Data-Flow Analysis, in the 31st USENIX Security Symposium, August 2022.

  8. [USENIX Security'22] Sheng Yu, Yu Qu, Xunchao Hu, and Heng Yin, DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly, in the 31st USENIX Security Symposium, August 2022.

  9. [S&P'22] Ju Chen, Jinghan Wang, Chengyu Song, and Heng Yin, JIGSAW: Efficient and Scalable Path Constraints Fuzzing, in the 43rd IEEE Symposium on Security and Privacy, May 2022.

  10. [NDSS'22] Zhenxiao Qi, Yu Qu, and Heng Yin, LogicMem: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference, in the Network an Distributed system Security symposium, February 2022.

  11. [CCS'21] Xuezixiang Li, Yu Qu, and Heng Yin, PalmTree: Learning an Assembly Language Model for Instruction Embedding, to appear in the ACM Confernece on Computer and Communications Security, November 2021.

  12. [NDSS'21] Jinghan Wang, Chengyu Song, and Heng Yin, Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing, in the Network and Distributed System Security Symposium, February 2021.

Did this answer your question?