This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be created for a program written in a high-level language. Our goal is to perform this task for programs such as plugins, mobile code, worms, and virus-infected code. For such programs, symbol-table and debugging information is either entirely absent, or cannot be relied upon if present; hence, the technique described in the paper makes no use of symbol-table/debugging information. Instead, an analysis is carried out to recover information about the contents of memory locations and how they are manipulated. The analysis, called value-set analysis, tracks address-value...
Memory access tracing is a program analysis technique with many different applications, ranging from...
Given a crash dump or a kernel memory snapshot, it is often de-sirable to have a capability that can...
The goal of our work is to create tools that an analyst can use to understand the workings of COTS c...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Over the last seven years, we have developed static-analysis methods to recover a good approxi-matio...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
This paper addresses two problems that arise when analyzing executables: (1) recovering variable-lik...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
There is growing interest in analyzing executables to look for bugs and security vulnerabilities. T...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
Abstract—This paper makes two contributions regarding reverse engineering of executables. First, tec...
Static program analysis computes information about a program without executing the program. This can...
Various methods for memory fault detection have been developed through continuous study. However, ma...
Memory access tracing is a program analysis technique with many different applications, ranging from...
Given a crash dump or a kernel memory snapshot, it is often de-sirable to have a capability that can...
The goal of our work is to create tools that an analyst can use to understand the workings of COTS c...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Over the last seven years, we have developed static-analysis methods to recover a good approxi-matio...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
This paper addresses two problems that arise when analyzing executables: (1) recovering variable-lik...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
There is growing interest in analyzing executables to look for bugs and security vulnerabilities. T...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
Abstract—This paper makes two contributions regarding reverse engineering of executables. First, tec...
Static program analysis computes information about a program without executing the program. This can...
Various methods for memory fault detection have been developed through continuous study. However, ma...
Memory access tracing is a program analysis technique with many different applications, ranging from...
Given a crash dump or a kernel memory snapshot, it is often de-sirable to have a capability that can...
The goal of our work is to create tools that an analyst can use to understand the workings of COTS c...