Static Binary Instrumentation is a technique that allows compile-time program manipulation. In particular, by relying on ad-hoc tools, the end user is able to alter the program’s execution flow without affecting its overall semantic. This technique has been effectively used, e.g., to support code profiling, performance analysis, error detection, attack detection, or behavior monitoring. Nevertheless, efficiently relying on static instrumentation for producing executables which can be deployed without affecting the overall performance of the application still presents technical and methodological issues. In this paper, we present Hijacker, an open-source customizable static binary instrumentation tool which is able to alter a program’s execu...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Software vulnerabilities are added into programs during its development. Architectural flaws are int...
Static Binary Instrumentation is a technique that allows compile-time program manipulation. In parti...
Hijacker is an open-source customizable static binary instrumentation tool which is able to alter a ...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
International audienceMost of hardware-assisted solutions for software security, program monitoring,...
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Intrusion detection systems that monitor sequences of system calls have recently become more sophist...
International audienceAs software complexity increases, the analysis of code behavior during its exe...
Embedded software must meet conflicting requirements such as being highly reliable, running on resou...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
Static program analysis computes information about a program without executing the program. This can...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Software vulnerabilities are added into programs during its development. Architectural flaws are int...
Static Binary Instrumentation is a technique that allows compile-time program manipulation. In parti...
Hijacker is an open-source customizable static binary instrumentation tool which is able to alter a ...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
International audienceMost of hardware-assisted solutions for software security, program monitoring,...
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Intrusion detection systems that monitor sequences of system calls have recently become more sophist...
International audienceAs software complexity increases, the analysis of code behavior during its exe...
Embedded software must meet conflicting requirements such as being highly reliable, running on resou...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
Static program analysis computes information about a program without executing the program. This can...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Software vulnerabilities are added into programs during its development. Architectural flaws are int...