Verifying the safety and security requirements of embedded software requires a code analysis. Many software systems are developed based on software development libraries; therefore, code specifications are known at compiling time. Hence, many source-code analyses will be excluded, and low-level intermediate representations (LLIRs) of the analyzed binaries are preferred. Improving the expressiveness of the LLIR and enhancing it with more information from the binaries will improve the tightness of the applied analyses. This work is interested in developing a lifterthat lifts binaries into an enhanced LLIR and can resolve indirect jumps. LLVM is used as the LLIR. Our proposed lifter, which we call DEL (Dynamic symbolic Execution Lifter), comb...
Symbolic execution is a powerful program analysis technique that systematically explores multiple pr...
Symbolic execution is a program analysis technique that aims to automatically identify interesting i...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Constructing a complete control-flow graph (CGF) and computing upper bounds on loops of a computing ...
University of Technology Sydney. Faculty of Engineering and Information Technology.This thesis prese...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...
Complexity in malicious software is increasing to avoid detection and mitigation. As such, there is ...
Analyzing binary programs is necessary in many situations when we do not have the programs source co...
textThe last few years have seen a resurgence of interest in the use of symbolic execution--program ...
Modern software systems require the support of automatic program analyses to answer questions about ...
Symbolic execution has the potential to make software more secure by significantly improving automat...
Malware is becoming both more complex and pervasive, infecting a seemingly endless supply of new de...
Dynamic Symbolic Execution (DSE) is a technique to automatically generate test inputs by executing a...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Symbolic execution is a powerful technique for analyzing program behavior, finding bugs, and generat...
Symbolic execution is a powerful program analysis technique that systematically explores multiple pr...
Symbolic execution is a program analysis technique that aims to automatically identify interesting i...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Constructing a complete control-flow graph (CGF) and computing upper bounds on loops of a computing ...
University of Technology Sydney. Faculty of Engineering and Information Technology.This thesis prese...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...
Complexity in malicious software is increasing to avoid detection and mitigation. As such, there is ...
Analyzing binary programs is necessary in many situations when we do not have the programs source co...
textThe last few years have seen a resurgence of interest in the use of symbolic execution--program ...
Modern software systems require the support of automatic program analyses to answer questions about ...
Symbolic execution has the potential to make software more secure by significantly improving automat...
Malware is becoming both more complex and pervasive, infecting a seemingly endless supply of new de...
Dynamic Symbolic Execution (DSE) is a technique to automatically generate test inputs by executing a...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Symbolic execution is a powerful technique for analyzing program behavior, finding bugs, and generat...
Symbolic execution is a powerful program analysis technique that systematically explores multiple pr...
Symbolic execution is a program analysis technique that aims to automatically identify interesting i...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...