Semantic reverse engineering has become the main approach to explore and understand the big picture of the binary code for closed-source software packages. However, semantic reverse engineering still has two unsolved challenges: (1) to recognize and recover data structure instances from binary memory images without execution traces; and (2) to locate the critical algorithm implementation and extract the high-level semantic meaning for the associated memory addresses/registers. These capabilities have many computer security and forensics applications, such as vulnerability discovery, sensitive data protection and so on. In this dissertation, I present new techniques to perform automatic semantic reverse engineering to address the above-menti...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Computer software is, by its very nature highly complex and invisible yet subject to a near-continua...
Reversing engineering of data structures involves two aspects: (1) given an application binary, infe...
Software often contains proprietary information --- algorithms, intellectual property, and encryptio...
International audienceRetrieving assets inside a secure element is a challenging task.The most attra...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Uncovering and understanding the intent of an unknown piece of software is a significant task for cy...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Reverse engineering binary executable code is gaining more interest in the research community. Agenc...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Reverse engineering of software binary codes have reached an advanced state that can be effectively ...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Computer software is, by its very nature highly complex and invisible yet subject to a near-continua...
Reversing engineering of data structures involves two aspects: (1) given an application binary, infe...
Software often contains proprietary information --- algorithms, intellectual property, and encryptio...
International audienceRetrieving assets inside a secure element is a challenging task.The most attra...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Software is ubiquitous in society, but understanding it, especially without access to source code, i...
Uncovering and understanding the intent of an unknown piece of software is a significant task for cy...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Reverse engineering binary executable code is gaining more interest in the research community. Agenc...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Reverse engineering of software binary codes have reached an advanced state that can be effectively ...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Computer software is, by its very nature highly complex and invisible yet subject to a near-continua...