The analysis of binaries has gotten an increasing amount of attention from the academic community in the last decade. The results of binary analysis have been predominantly used to answer questions about the properties of binaries. Another potential use of analysis results is to rewrite the binary via semantic transformations. Semantics-based binary-rewriting tools become particularly important when one wishes to modify the functionality of the binary, and the source code and/or compiler toolchain for the binary is unavailable. Semantics-based binary rewriting can be done for the purposes of binary optimization (offline optimization, superoptimization), software reuse (partial evaluation, slicing, binary translation), or software security ...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Building systems that can synthesize programs from natural specifications (such as examples or langu...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
In this paper, we present a technique to synthesize machine-code instructions from a semantic specif...
In this paper, we present a technique to synthesize machine-code instructions from a semantic specif...
Program synthesis is a term that describes a family of techniques that enables automatic generation ...
Assessing software robustness became arduous given the broad adoption of obfuscation in the industry...
Binary translation, the automatic translation of executable programs from one machine to another, re...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
Computer architecture manuals describe the instruction set of the machine and the semantics of those...
Symbolic execution is a key component of precise binary program analysis tools. We discuss how to au...
Motivated by improvements in constraint-solving technology and by the increase of routinely availabl...
This paper presents an algorithm for off-line partial evaluation of machine code. The algorithm foll...
The ability to directly reason about binary machine code is desirable, not only because it allows an...
This paper describes methods and procedures used for code analysis and transformation. It contains b...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Building systems that can synthesize programs from natural specifications (such as examples or langu...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
In this paper, we present a technique to synthesize machine-code instructions from a semantic specif...
In this paper, we present a technique to synthesize machine-code instructions from a semantic specif...
Program synthesis is a term that describes a family of techniques that enables automatic generation ...
Assessing software robustness became arduous given the broad adoption of obfuscation in the industry...
Binary translation, the automatic translation of executable programs from one machine to another, re...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
Computer architecture manuals describe the instruction set of the machine and the semantics of those...
Symbolic execution is a key component of precise binary program analysis tools. We discuss how to au...
Motivated by improvements in constraint-solving technology and by the increase of routinely availabl...
This paper presents an algorithm for off-line partial evaluation of machine code. The algorithm foll...
The ability to directly reason about binary machine code is desirable, not only because it allows an...
This paper describes methods and procedures used for code analysis and transformation. It contains b...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Building systems that can synthesize programs from natural specifications (such as examples or langu...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...