ARC – Artifact Reuse Comparator

By Rushikesh D Nandedkar on 06 Aug 2025 @ Blackhat : Arsenal
🔗 Link
static-analysis reverse-engineering binary-analysis executable-analysis malware-reverse-engineering code-analysis
Focus Areas: Application Security , Malware Analysis , Reverse Engineering
This Tool Demo covers following tools where the speaker has contributed or authored
ARC

Abstract

ARC (Artifact Reuse Comparator) is a state-of-the-art static analysis tool that disassembles Windows PE files (executables and DLLs), extracts various code artefacts (functions, basic blocks, API calls, sliding-window fingerprints), and compares them across binaries to detect reuse—even in obfuscated samples. ARC stores these artefacts in an SQLite database and generates detailed TXT and HTML reports. Additionally, ARC features control flow graph (CFG) visualization, providing analysts with both high-level and granular views of code similarity. Its modular design and extensibility make it an essential tool for malware analysis and reverse engineering.