Being able to properly represent dynamic code, or the notion of code that is created/modified at runtime, is crucial towards improving debugging capabilities, aiding software security analysis, and building a general understanding of the systems that make use of dynamic code. From malware to Just-In-time (JIT) compilers, dynamic code is surprisingly commonplace in today’s software ecosystem. Yet despite the prevalence of dynamic code, we have found that the current state of the art program analysis tools are incapable of properly representing dynamic code as it is created/modified over a program’s execution. This work aims to provide an improved program representation, allowing for what we call end-to-end analysis to help reason about dynam...
Today, malicious software on networks is the major threat to internet security. Analysis of the mali...
Dynamic analysis can identify improvements to programs that cannot feasibly be identified by static ...
International audienceRecent research proposed efficient methods for software verification combining...
A dynamic program slice is an executable part of a program whose behavior is identical, for the same...
Dynamic analysis (instrumenting programs with code to detect and prevent errors during program execu...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
Taint analysis is a popular method in software analysis field including vulnerability/malware analys...
Abstract—To handle the growing flood of malware, security vendors and analysts rely on tools that au...
Identifying the code needed to perform software main-tenance and evolution tasks can be very difficu...
AbstractThe evolution of computer science has exposed us to the growing gravity of security problems...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code ...
Dynamic program analysis encompasses the development of techniques and tools for analyzing computer ...
Information flow analysis is concerned with validating the security of information flows between obj...
Today, malicious software on networks is the major threat to internet security. Analysis of the mali...
Dynamic analysis can identify improvements to programs that cannot feasibly be identified by static ...
International audienceRecent research proposed efficient methods for software verification combining...
A dynamic program slice is an executable part of a program whose behavior is identical, for the same...
Dynamic analysis (instrumenting programs with code to detect and prevent errors during program execu...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
Taint analysis is a popular method in software analysis field including vulnerability/malware analys...
Abstract—To handle the growing flood of malware, security vendors and analysts rely on tools that au...
Identifying the code needed to perform software main-tenance and evolution tasks can be very difficu...
AbstractThe evolution of computer science has exposed us to the growing gravity of security problems...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code ...
Dynamic program analysis encompasses the development of techniques and tools for analyzing computer ...
Information flow analysis is concerned with validating the security of information flows between obj...
Today, malicious software on networks is the major threat to internet security. Analysis of the mali...
Dynamic analysis can identify improvements to programs that cannot feasibly be identified by static ...
International audienceRecent research proposed efficient methods for software verification combining...