Over the last seven years, we have developed static-analysis methods to recover a good approxi-mation to the variables and dynamically allocated memory objects of a stripped executable, and to track the flow of values through them. The article presents the algorithms that we developed, explains how they are used to recover Intermediate Representations (IRs) from executables that are similar to the IRs that would be available if one started from source code, and describes their application in the context of program understanding and automated bug hunting. Unlike algorithms for analyzing executables that existed prior to our work, the ones presented in this article provide useful information about memory accesses, even in the absence of debug...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
This project explores the feasibility of using Intel Pin, a framework for creating tools, called Pin...
There is an increasing need for tools to help programmers and security analysts understand executab...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
This paper addresses two problems that arise when analyzing executables: (1) recovering variable-lik...
The goal of our work is to create tools that an analyst can use to understand the workings of COTS c...
Abstract The goal of our work is to create tools that an analyst can use tounderstand the workings o...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Various methods for memory fault detection have been developed through continuous study. However, ma...
We present scalable static analyses to recover variables, data types, and function prototypes from s...
Abstract—This paper makes two contributions regarding reverse engineering of executables. First, tec...
There is growing interest in analyzing executables to look for bugs and security vulnerabilities. T...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
This project explores the feasibility of using Intel Pin, a framework for creating tools, called Pin...
There is an increasing need for tools to help programmers and security analysts understand executab...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
This paper addresses two problems that arise when analyzing executables: (1) recovering variable-lik...
The goal of our work is to create tools that an analyst can use to understand the workings of COTS c...
Abstract The goal of our work is to create tools that an analyst can use tounderstand the workings o...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Various methods for memory fault detection have been developed through continuous study. However, ma...
We present scalable static analyses to recover variables, data types, and function prototypes from s...
Abstract—This paper makes two contributions regarding reverse engineering of executables. First, tec...
There is growing interest in analyzing executables to look for bugs and security vulnerabilities. T...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
This project explores the feasibility of using Intel Pin, a framework for creating tools, called Pin...
There is an increasing need for tools to help programmers and security analysts understand executab...