TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

De-anonymizing programmers from binaries (2017)

103 点作者 pvitz将近 3 年前

10 条评论

dang将近 3 年前
Related:<p><i>De-anonymizing programmers from executable binaries</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16598962" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16598962</a> - March 2018 (39 comments)<p><i>When coding style survives compilation: De-anonymizing programmers from binaries</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10806956" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10806956</a> - Dec 2015 (67 comments)
startupdiscuss将近 3 年前
Not directly relevant but it got me thinking:<p>Has anyone tried to use the source code and white paper to figure out who Satoshi Nakamoto might be?<p>If you can figure it out from binaries, surely there is a lot more info. And you have the github and the blogosphere to compare.
评论 #32400994 未加载
naillo将近 3 年前
This uses 600 &#x27;candidate&#x27; programmers. But I wonder how much harder it becomes when on e.g. an arbitrary piece of github gist code. As the number of candidates increases (with many writing the same styles) I&#x27;d imagine the problem becomes enormously more difficult.
评论 #32398253 未加载
评论 #32398945 未加载
rdcc将近 3 年前
I am thinking of a future when every piece of code can be traced back to a common ancestor because everyone is using a tool like copilot and there is no identifying signature. De-anonymization is only going to become more difficult.
rubicks将近 3 年前
How effective is, say, movfuscator against this?<p><a href="https:&#x2F;&#x2F;github.com&#x2F;xoreaxeaxeax&#x2F;movfuscator" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;xoreaxeaxeax&#x2F;movfuscator</a>
评论 #32399019 未加载
pca006132将近 3 年前
Their experiment with different optimization level is with symbol information intact and they did not mention whether they have debug information enabled. Stripping the binary but with no optmimization reduces accuracy by 24%, but they did not mention the accuracy of O3 + stripped binary, so I guess it is probably not that good as this is so obvious that they should have tried.<p>Interesting research anyway.
评论 #32401601 未加载
_int3_将近 3 年前
Basically , to outsmart this algorithm you can use deniability attack<p>You just say that someone imitated your style. It&#x27;s not like binary has cryptographic signature of person who compiled it, even then you can say that someone stole your private key.
badrabbit将近 3 年前
This is very interesting in terms of threatintel and attributing malware to attackers.
评论 #32396225 未加载
ramboldio将近 3 年前
I don&#x27;t even want to know what the GDPR-implications of this are..
评论 #32401922 未加载
评论 #32395898 未加载
评论 #32395885 未加载
aaron695将近 3 年前
This implies compilers are not as efficient as they could be and work needs to be done on that. Style in a binary is waste.<p>If it&#x27;s true.<p>Are they sure it&#x27;s not from text within the programs or other fingerprints?<p>I wish they gave examples of the fingerprints. It&#x27;s hard to even know how to move forward without that.
评论 #32399572 未加载