Abstract. A probabilistic finite state machine approach to statically disassem-bling x86 machine language programs is presented and evaluated. Static disassembly is a crucial prerequisite for software reverse engineering, and has many applica-tions in computer security and binary analysis. The general problem is provably undecidable because of the heavy use of unaligned instruction encodings and dy-namically computed control flows in the x86 architecture. Limited work in machine learning and data mining has been undertaken on this subject. This paper shows that semantic meanings of opcode sequences can be leveraged to infer similarities between groups of opcode and operand sequences. This empowers a probabilistic finite state machine to lea...
Optimal disassembly sequences can be obtained on the basis of linear and mixed-integer programming m...
For the past two decades, computer viruses have been a constant security threat. A computer virus is...
Based on earlier research on optimal disassembly sequence generation, notably graphically supported ...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
Disassembly is the basis of static analysis of binary code and is used in malicious code detection, ...
The problem of correctly recovering assembly instructions from a binary has received much attention ...
Machine code disassembly routines form a fundamental component of software systems that statically a...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
There are many security tools and techniques for finding bugs, but many of them assume access to sou...
International audienceFighting malware involves analyzing large numbers of suspicious binary files. ...
Of all software development activities, debugging---locating the defective source code statements th...
This paper describes methods and procedures used for code analysis and transformation. It contains b...
By restoring the program into an easier understandable form, deobfuscation is an important technique...
The analysis of binaries has gotten an increasing amount of attention from the academic community in...
Optimal disassembly sequences can be obtained on the basis of linear and mixed-integer programming m...
For the past two decades, computer viruses have been a constant security threat. A computer virus is...
Based on earlier research on optimal disassembly sequence generation, notably graphically supported ...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
Disassembly is the basis of static analysis of binary code and is used in malicious code detection, ...
The problem of correctly recovering assembly instructions from a binary has received much attention ...
Machine code disassembly routines form a fundamental component of software systems that statically a...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
There are many security tools and techniques for finding bugs, but many of them assume access to sou...
International audienceFighting malware involves analyzing large numbers of suspicious binary files. ...
Of all software development activities, debugging---locating the defective source code statements th...
This paper describes methods and procedures used for code analysis and transformation. It contains b...
By restoring the program into an easier understandable form, deobfuscation is an important technique...
The analysis of binaries has gotten an increasing amount of attention from the academic community in...
Optimal disassembly sequences can be obtained on the basis of linear and mixed-integer programming m...
For the past two decades, computer viruses have been a constant security threat. A computer virus is...
Based on earlier research on optimal disassembly sequence generation, notably graphically supported ...