Binary code analysis has attracted much attention. The difficulty lies in constructing a Control Flow Graph (CFG), which is dynamically generated and modified, such as mutations. Typical examples are handling dynamic jump instructions, in which destinations may be directly modified by rewriting loaded instructions on memory. In this paper, we describe a PhD project proposal on a hybrid approach that combines static analysis and dynamic testing to construct CFG from binary code. Our aim is to minimize false targets produced when processing indirect jumps during CFG construction. To evaluate the potential of our approach, we preliminarily compare results between our method and Jakstab, a state-of-the-art tool in this field
Dynamic analysis of binary files is an area of computer science that has many purposes. It is useful...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
Black-box and white-box testing are the two major techniques for unit testing. In black-box testing,...
Static analysis requires the full knowledge of the overall program structure. The structure of a pro...
International audienceStatic analysis requires the full knowledge of the overall program structure. ...
Irregular control-flow structures like deeply nested conditional branches are common in real-world s...
The most of the analyses evaluating the quality of code are derived from Control Flow Graphs -- CFG....
This paper presents the description of a possible way to build the universal linearized control flow...
To develop new compilation and optimization techniques, computer scientists frequently Consult progr...
Refactoring is a common step in the process of modernising software. This task is often delegated to...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Abstract. Detection of infeasible code has recently been identified as a scalable and automated tech...
Abstract. Security analysis often requires understanding both the con-trol and data-flow structure o...
Understanding control ows in a computer program is essential for many software engineering tasks su...
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CR...
Dynamic analysis of binary files is an area of computer science that has many purposes. It is useful...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
Black-box and white-box testing are the two major techniques for unit testing. In black-box testing,...
Static analysis requires the full knowledge of the overall program structure. The structure of a pro...
International audienceStatic analysis requires the full knowledge of the overall program structure. ...
Irregular control-flow structures like deeply nested conditional branches are common in real-world s...
The most of the analyses evaluating the quality of code are derived from Control Flow Graphs -- CFG....
This paper presents the description of a possible way to build the universal linearized control flow...
To develop new compilation and optimization techniques, computer scientists frequently Consult progr...
Refactoring is a common step in the process of modernising software. This task is often delegated to...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Abstract. Detection of infeasible code has recently been identified as a scalable and automated tech...
Abstract. Security analysis often requires understanding both the con-trol and data-flow structure o...
Understanding control ows in a computer program is essential for many software engineering tasks su...
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CR...
Dynamic analysis of binary files is an area of computer science that has many purposes. It is useful...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
Black-box and white-box testing are the two major techniques for unit testing. In black-box testing,...