Typically, dynamic-analysis techniques operate on a small subset of all possible program behaviors, which limits their effectiveness and the representativeness of the computed results. To address this issue, a new paradigm is emerging: execution hijacking—techniques that explore a larger set of program behaviors by forcing executions along specific paths. Although hijacked executions are infeasible for the given inputs, they can still produce feasible behaviors that could be observed under other inputs. In such cases, execution hijacking can improve the effectiveness of dynamic analysis without requiring the (expensive) generation of additional inputs. To evaluate the usefulness of execution hijacking, we defined, implemented, a...
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, ...
Fixing runtime bugs in long running programs using trace based analyses such as dynamic slicing was ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
Dynamic program analysis is extremely successful both in code debugging and in malicious code attack...
Dynamic Malware Analysis involves the observation of a malware sample at runtime, usually inside a s...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
At present there exist three main schools of thought for improving single-threaded program performan...
AbstractDynamic analysis (instrumenting programs with code to detect and preven errors during progra...
Abstract—Dynamic taint analysis and forward symbolic execution are quickly becoming staple technique...
When fixing a bug in software, developers must build an understanding or explanation of the bug and ...
Dynamic slicing is an analysis that operates on program ex-ecution models (e.g., dynamic dependence ...
Fixing runtime bugs in long running programs using tracing based analyses such as dynamic slicing wa...
Static Binary Instrumentation is a technique that allows compile-time program manipulation. In parti...
Being able to properly represent dynamic code, or the notion of code that is created/modified at run...
When fixing a bug in software, developers must build an understanding or explanation of the bug and ...
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, ...
Fixing runtime bugs in long running programs using trace based analyses such as dynamic slicing was ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
Dynamic program analysis is extremely successful both in code debugging and in malicious code attack...
Dynamic Malware Analysis involves the observation of a malware sample at runtime, usually inside a s...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
At present there exist three main schools of thought for improving single-threaded program performan...
AbstractDynamic analysis (instrumenting programs with code to detect and preven errors during progra...
Abstract—Dynamic taint analysis and forward symbolic execution are quickly becoming staple technique...
When fixing a bug in software, developers must build an understanding or explanation of the bug and ...
Dynamic slicing is an analysis that operates on program ex-ecution models (e.g., dynamic dependence ...
Fixing runtime bugs in long running programs using tracing based analyses such as dynamic slicing wa...
Static Binary Instrumentation is a technique that allows compile-time program manipulation. In parti...
Being able to properly represent dynamic code, or the notion of code that is created/modified at run...
When fixing a bug in software, developers must build an understanding or explanation of the bug and ...
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, ...
Fixing runtime bugs in long running programs using trace based analyses such as dynamic slicing was ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...