#binarydiffing

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-23

📚 “Comparing binaries with radiff2” - a video tutorial by Mohamed Atta Abozaid (Egypt)

👀 video youtu.be/RsI8hNhsi_U
👉source github.com/ReEng101/Binary-Com

#radare2 #reverseengineering #BinaryDiffing

Joxean Koret (@matalaz)joxean
2024-11-03

This paper looks promising: "SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing".

ink.library.smu.edu.sg/cgi/vie

Joxean Koret (@matalaz)joxean
2024-09-23

The code is also published (in github) already and now can use an already trained model to try to improve binary diffing results (matching). I haven't made yet a new release just yet as these changes are considered a bit experimental for now.

The datasets and tools for training and testing are here: github.com/joxeankoret/diaphor
And Diaphora, is here: github.com/joxeankoret/diaphora

Joxean Koret (@matalaz)joxean
2024-09-23

Here are the slides of my "Simple Machine Learning Techniques for Binary Diffing (with Diaphora)" talk given at the @44CON conference last week:

github.com/joxeankoret/diaphor

Joxean Koret (@matalaz)joxean
2024-08-15

This is not at all my own idea and this is, basically, the only thing that academia researches as of today: almost every single academic paper published in the last years talking about binary diffing (or, as academia calls it "Binary Code Similarity Analysis") is based on "machine learning" techniques.

Some popular academic examples: DeepBinDiff or BindiffNN. Don't worry if you don't know them. Nobody uses them. At all.

Joxean Koret (@matalaz)joxean
2024-02-14

Any cool bug in Microsoft's February 2024 Patch Tuesday??

Joxean Koret (@matalaz)joxean
2024-01-09

It's very sad, but it's always a damn waste of time reading academic research about binary diffing or, as it's called at the academia, about binary code similarity analysis. It's either all fairytales that cannot be proved or, plainly, false and/or wrong.

An example? One paper that I have re-read today says that and are mono-architecture and totally discard these tools for the paper. LOL.

Joxean Koret (@matalaz)joxean
2023-10-20

Fun Reverse Engineering problem du jour. A compilation unit is a set of functions. Cool. However, a function might belong to one or many compilation units.

For example, in , I used to think that once I have a compilation unit name for a function, that function belongs to just that one CU. However, if a function from, for example, a header file is in-lined inside a function, what compilation unit does that function belong to?

Joxean Koret (@matalaz)joxean
2023-10-15

The support for finding fixed signedness issues in is working (to highlight potentially fixed vulnerabilites):

A signed to unsigned check changed in ARM.A signed to unsigned check changed in x86.
Joxean Koret (@matalaz)joxean
2023-10-13

Me every time I have a "new" idea for doing in with algorithms based on graph theory:

Joxean Koret (@matalaz)joxean
2023-10-11

Any cool bug on this Patch Tuesday? Anything cool to diff with and enhance the ability to try to find patched vulnerabilities?

Joxean Koret (@matalaz)joxean
2023-09-30

Did you know that detects patch diffing sessions and tries to help finding where vulnerabilities were fixed? Here are some examples for CVE-2020-1350 and CVE-2023-28231.

Diaphora showing the exact place where CVE-2020-1350 was fixed.Diaphora showing the exact place where CVE-2023-28231 was fixed.
Joxean Koret (@matalaz)joxean
2023-07-14

Also, of even small is very slow and would only, probably, help for comparing binaries for the same (or compatible) architecture. And in order to compare binaries for the same architectures you have a myriad of different, not terribly slow, ways for doing .

Joxean Koret (@matalaz)joxean
2023-07-14

One question regarding : Have you ever used a tool called ? I am not talking about "BinDiff" but rather about "DeepBinDiff".

Joxean Koret (@matalaz)joxean
2023-07-14
Joxean Koret (@matalaz)joxean
2023-07-02

Dear everyone in the academia using "Machine Learning" for Binary Code Similarity Analysis (ie, bindiffing): AI is bad for anything that requires exact results. It will generate a huge amount of false positives mixed with a varying degree of similar results and is pretty hard to understand its output.

Félix Brezofebrezo
2023-06-24

@joxean, really enjoying the presentation of a world-class reference in . Absolute respect for the amount of work behind the scenes in terms of side-technical challenges such as multiplatform testing. Even without deepening on the problem addressed, I can still appreciate the huge amount of time spent, simply, making things work as expected.

Joxean Koret (@matalaz)joxean
2023-05-02

with CVE-2023-28231. As explained in the linked blog from @thezdi, the vulnerability has been fixed by checking that the number of relay forward messages in "ProcessRelayForwardMessage()" is not bigger or equal than 32 (0x20), as shown in the following pseudo-code diffing:

zerodayinitiative.com/blog/202

Joxean Koret (@matalaz)joxean
2023-03-19
Joxean Koret (@matalaz)joxean
2023-03-19

So, let's say that we have 2 functions in binary A matching 2 functions in binary B *but* both A functions and B functions have the exact same score for the 4 matches (and the same callers and callees). This looks like a complex match to resolve, right?

So, what do you think is (apparently) the best and simplest method in to determine which match is the appropriate one?

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst