There are many security tools and techniques for finding bugs, but many of them assume access to source code. We propose leveraging decompilation, the study of recovering abstractions from binary code, as a technique for applying existing source-based tools and techniques to binary programs. A decompiler must have two properties to be used for security: it must (1) be correct (is the output functionally equivalent to the binary code?), and (2) recover abstractions (e.g., the output should utilize while loops commands and not gotos). Previous work in control-flow structuring, which is a building block for decompilers, is insufficient for use in security, because it does not provide correctness and effective abstraction recovery. Specifically...
Reverse engineering binaries is required to understand and analyse programs for which the source cod...
ISSN 1476-2986 Decompilation is the process of converting programs in a low-level representation, su...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
There are many security tools and techniques for analyzing software, but many of them require access...
Many security techniques have been developed both in academia and industry to analyze source code, i...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
. A structuring algorithm for arbitrary control flow graphs is presented. Graphs are structured into...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
Many source code tools help software programmers analyze programs as they are being developed, but s...
This thesis deals with a decompilation tool which converts low-level binary code to a high-level rep...
We present BIRD: A Binary Intermediate Representation for formally verified Decompilation of x86-64 ...
Legacy binaries that do not have source code remain a vital part of our software ecosystem. Lifting ...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
Reverse engineering binaries is required to understand and analyse programs for which the source cod...
ISSN 1476-2986 Decompilation is the process of converting programs in a low-level representation, su...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
There are many security tools and techniques for analyzing software, but many of them require access...
Many security techniques have been developed both in academia and industry to analyze source code, i...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
. A structuring algorithm for arbitrary control flow graphs is presented. Graphs are structured into...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
Many source code tools help software programmers analyze programs as they are being developed, but s...
This thesis deals with a decompilation tool which converts low-level binary code to a high-level rep...
We present BIRD: A Binary Intermediate Representation for formally verified Decompilation of x86-64 ...
Legacy binaries that do not have source code remain a vital part of our software ecosystem. Lifting ...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
Reverse engineering binaries is required to understand and analyse programs for which the source cod...
ISSN 1476-2986 Decompilation is the process of converting programs in a low-level representation, su...
A recurring problem in security is reverse engineering binary code to recover high-level language da...