9:20 am - 9:30 am Welcome and Opening Remarks

9:30 am - 10:30 am Keynote: The hard things about analyzing 1’s and 0’s...

Dr. David Brumley, Carnegie Mellon University - ForAllSecure

10:30 am - 11:00 am Morning Break

11:00 am - 12:30 pm Session 1: Binary Analysis and Security



Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture

Xiaochuan Zhang (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology), Wenjie Sun (State Key Laboratory of Mathematical Engineering and Advanced Computing), Jianmin Pang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Fudong Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Zhen Ma (State Key Laboratory of Mathematical Engineering and Advanced Computing)



o-glassesX: Compiler Provenance Recovery with Attention Mechanism from a Short Code Fragment

Yuhei Otsubo (National Police Agency, Tokyo, Japan), Akira Otsuka (Institute of information Security, Japan), Mamoru Mimura (National Defense Academy, Japan), Takeshi Sakaki (The University of Tokyo, Japan), Hiroshi Ukegawa (National Police Agency, Tokyo, Japan)



Creating Human Readable Path Constraints from Symbolic Execution

Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories)



Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution

Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)

12:30 pm - 1:30 pm Lunch

1:30 pm - 2:40 pm Session 2: Analyzing Difficult Targets



It Doesn’t Have to Be So Hard: Efficient Symbolic Reasoning for CRC

Vaibhav Sharma (University of Minnesota), Navid Emamdoost (University of Minnesota), Seonmo Kim (University of Minnesota), Stephen McCamant (University of Minnesota)



A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly

Yu-Jye Tung (University of California, Irvine), Ian Harris (University of California Irvine)



QSynth - A Program Synthesis based approach for Binary Code Deobfuscation

Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)

2:40 pm - 3:00 pm Invited Demo: Analyzing obfuscated binaries with QSynth

Robin David (Quarkslab)

3:00 pm - 3:30 pm Afternoon Break

3:30 pm - 4:00 pm Invited Talk: IoT Platform Fuzzing

Jacopo Corbetta (Qualcomm)

4:00 pm - 4:30 pm Invited Talk: The State of Firmware Analysis

Eric Gustafson (UC Santa Barbara)