There is growing interest in analyzing executables to look for bugs and security vulnerabilities. This paper describes the design and implementation of a language for describing the semantics of an instruction set, along with a run-time system to support the static analysis of executables written in that instruction set. The work advances the state of the art by creating multiple analysis phases from a specification of the concrete operational semantics of the language to be analyzed. By exploiting this powerful infrastructure for creating analysis components, it will be possibly for recently developed analysis techniques for analyzing executables to be applied more broadly, to executables written in a variety of instructions sets
The ability to reverse the most advanced software protection schemes is a critical step in mitigatin...
Abstracted semantics of instructions of processor-based architectures are an invaluable asset for se...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
Program slicing is a technique for determining the set of statements of a program that potentially a...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Abstract. We report on a successful preliminary experience in the design and implementation of a spe...
Abstract. We report on a successful preliminary experience in the de-sign and implementation of a sp...
We report on a successful preliminary experience in the design and implementation of a speci...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
We report on a successful preliminary experience in the design and implementation of a special-purpo...
Abstract—Detection of vulnerabilities in executables is one of the major problems facing the softwar...
The ability to reverse the most advanced software protection schemes is a critical step in mitigatin...
Abstracted semantics of instructions of processor-based architectures are an invaluable asset for se...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Abstract. There is growing interest in analyzing executables to look for bugs and security vulnerabi...
Program slicing is a technique for determining the set of statements of a program that potentially a...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Abstract. We report on a successful preliminary experience in the design and implementation of a spe...
Abstract. We report on a successful preliminary experience in the de-sign and implementation of a sp...
We report on a successful preliminary experience in the design and implementation of a speci...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
We report on a successful preliminary experience in the design and implementation of a special-purpo...
Abstract—Detection of vulnerabilities in executables is one of the major problems facing the softwar...
The ability to reverse the most advanced software protection schemes is a critical step in mitigatin...
Abstracted semantics of instructions of processor-based architectures are an invaluable asset for se...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...