Skip to main content

Under the Hood of Dr. Binary

key research papers behind Dr. Binary

Admin Admin avatar
Written by Admin Admin
Updated over 2 months ago

Dr.Binary builds upon years of research in binary analysis, program analysis, and AI integration. Below is a representative list of foundational and directly related academic works:

  1. [ISSTA'25] Lian Gao and Heng Yin, BinDSA: Efficient, Precise Binary-Level Pointer Analysis with Context-Sensitive Heap Reconstruction, to appear in the ACM SIGSOFT International Symposium on Software Testing and Analysis, June 2025.

  2. [ISSTA'25] Xuezixiang Li, Sheng Yu, and Heng Yin, ALMOND: Learning an Assembly Language Model for 0-Shot Code Obfuscation Detection, to appear in the ACM SIGSOFT International Symposium on Software Testing and Analysis, June 2025.

  3. [USENIX Security'24] Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, and Heng Yin, SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution, in the 33rd USENIX Security Symposium, August 2024.

  4. [DSN'24] Sheng Yu, Wei Song, Xunchao Hu, and Heng Yin, On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach, in the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 2024. Distinguished Best Paper Award

  5. [ICSE'24] Jie Hu, Yue Duan, and Heng Yin, Marco: A Stochastic and Asynchronous Concolic Explorer, in the 46th International Conference on Software Engineering, April 2024.

  6. [NDSS'24] Lian Gao, Yu Qu, Sheng Yu, Yue Duan, and Heng Yin, SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing, in the Network and Distributed System Security Symposium, February 2024.

  7. [USENIX Security'22] Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyong Lee, Heng Yin, and Insik Shin, SymSan: Time and Space Efficient Concolic Execution via Dynamic Data-Flow Analysis, in the 31st USENIX Security Symposium, August 2022.

  8. [USENIX Security'22] Sheng Yu, Yu Qu, Xunchao Hu, and Heng Yin, DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly, in the 31st USENIX Security Symposium, August 2022.

  9. [S&P'22] Ju Chen, Jinghan Wang, Chengyu Song, and Heng Yin, JIGSAW: Efficient and Scalable Path Constraints Fuzzing, in the 43rd IEEE Symposium on Security and Privacy, May 2022.

  10. [NDSS'22] Zhenxiao Qi, Yu Qu, and Heng Yin, LogicMem: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference, in the Network an Distributed system Security symposium, February 2022.

  11. [CCS'21] Xuezixiang Li, Yu Qu, and Heng Yin, PalmTree: Learning an Assembly Language Model for Instruction Embedding, to appear in the ACM Confernece on Computer and Communications Security, November 2021.

  12. [NDSS'21] Jinghan Wang, Chengyu Song, and Heng Yin, Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing, in the Network and Distributed System Security Symposium, February 2021.

Did this answer your question?