There are many security tools and techniques for analyzing software, but many of them require access to source code. We propose leveraging decompilation, the study of recovering abstractions from compiled code, to apply existing source-based tools and techniques to compiled programs. A decompiler should focus on two properties to be used for security. First, it should recover abstractions as much as possible to minimize the complexity that must be handled by the security analysis that follows. Second, it should aim to recover these abstractions correctly. Previous work in control-flow structuring, an abstraction recovery problem used in decompilers, does not provide either of these properties. Specifically, existing structuring algorithms a...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
Despite their 40 year history, native executable decom-pilers have found very limited practical appl...
Analyzing third-party software such as malware or firmware is a crucial task for security analysts. ...
<p>There are many security tools and techniques for analyzing software, but many of them require acc...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
. A structuring algorithm for arbitrary control flow graphs is presented. Graphs are structured into...
ISSN 1476-2986 Decompilation is the process of converting programs in a low-level representation, su...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
Many security techniques have been developed both in academia and industry to analyze source code, i...
Many source code tools help software programmers analyze programs as they are being developed, but s...
We present BIRD: A Binary Intermediate Representation for formally verified Decompilation of x86-64 ...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Abstract: Reverse program compilation (i.e. decompilation) is a process heavily exploited in reverse...
This thesis deals with a decompilation tool which converts low-level binary code to a high-level rep...
Decompilation is a reconstruction of a program in a high-level language from a program in a low-leve...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
Despite their 40 year history, native executable decom-pilers have found very limited practical appl...
Analyzing third-party software such as malware or firmware is a crucial task for security analysts. ...
<p>There are many security tools and techniques for analyzing software, but many of them require acc...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
. A structuring algorithm for arbitrary control flow graphs is presented. Graphs are structured into...
ISSN 1476-2986 Decompilation is the process of converting programs in a low-level representation, su...
We present FoxDec: an approach to C code decompilation that aims at producing sound and recompilable...
Many security techniques have been developed both in academia and industry to analyze source code, i...
Many source code tools help software programmers analyze programs as they are being developed, but s...
We present BIRD: A Binary Intermediate Representation for formally verified Decompilation of x86-64 ...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Abstract: Reverse program compilation (i.e. decompilation) is a process heavily exploited in reverse...
This thesis deals with a decompilation tool which converts low-level binary code to a high-level rep...
Decompilation is a reconstruction of a program in a high-level language from a program in a low-leve...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
Despite their 40 year history, native executable decom-pilers have found very limited practical appl...
Analyzing third-party software such as malware or firmware is a crucial task for security analysts. ...