Most closed source drivers installed on desktop systems today have never been exposed to formal analysis. Without vendor support, the only way to make these often hastily written, yet critical programs accessible to static analysis is to directly work at the binary level. In this paper, we describe a full architecture to perform static analysis on binaries that does not rely on unsound external components such as disassemblers. To precisely calculate data and function pointers without any type information, we introduce Bounded Address Tracking, an abstract domain that is tailored towards machine code and is path sensitive up to a tunable bound assuring termination. We implemented Bounded Address Tracking in our binary...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
Static program analysis computes information about a program without executing the program. This can...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
Binary analysis seeks to comprehend the behavior and semantics of commercial-off-the-shelf (COTS) ex...
Many source code tools help software programmers analyze programs as they are being developed, but s...
Code coverage analysis plays an important role in the software testing process. More recently, the r...
AbstractThis paper describes the application of two abstraction techniques, namely dead variable red...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
Abstract — Rootkit’s main goal is to hide itself and other modules present in the malware. Their ste...
The complexity of software grows every year, and while there are many programming techniques and new...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
Static program analysis computes information about a program without executing the program. This can...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
Binary analysis seeks to comprehend the behavior and semantics of commercial-off-the-shelf (COTS) ex...
Many source code tools help software programmers analyze programs as they are being developed, but s...
Code coverage analysis plays an important role in the software testing process. More recently, the r...
AbstractThis paper describes the application of two abstraction techniques, namely dead variable red...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
Abstract — Rootkit’s main goal is to hide itself and other modules present in the malware. Their ste...
The complexity of software grows every year, and while there are many programming techniques and new...
It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in ...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
Static program analysis computes information about a program without executing the program. This can...