TRex: Practical Type Reconstruction for Binary Code

Jay Bosamiya

34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Software Security 4: Fuzzing and Other Software Analysis

In the intricate world of reverse engineering, understanding the behavior of compiled binary code is a monumental task, often hampered by the loss of high-level information during the compilation process. This talk introduces **TRex**, a novel tool designed to significantly alleviate the tedium associated with binary analysis by offering a practical approach to **type reconstruction**. The speaker, Jay Bosamiya, highlights a fundamental flaw in existing decompiler methodologies: their persistent, often futile, attempt to "recover" the original source code types. TRex challenges this paradigm, proposing that instead of striving for an impossible ground truth, reverse engineers truly desire an accurate representation of a program's observable behavior through its types.

AI review

Solid, foundational binary analysis research that earns its place at USENIX Security. The core insight — that perfect type recovery is mathematically impossible and the field has been chasing the wrong goal — is genuinely clarifying, and the structural-types-first approach backed by a deductive constraint engine is the right answer to the right question. The RESIM comparison (62% of outputs aren't valid C types, and it's a distinguished paper) is the kind of result that should make people uncomfortable in a productive way.

Watch on YouTube