Binary analysis seeks to comprehend the behavior and semantics of commercial-off-the-shelf (COTS) executable programs, which are fully stripped of both source code and debugging information. This form of analysis holds great significance across various contexts, including vulnerability detection, reverse engineering, memory forensics, binary hardening, and binary rewriting. Despite its critical relevance, binary analysis has predominantly relied on manual processes, demanding substantial expertise and human involvement. Among the diverse goals within binary analysis, two pivotal challenges stand out: type recovery and pointer analysis. These challenges underpin a multitude of subsequent tasks. The existing research landscape concerning the...
Analyzing and optimizing programs from their executables has received a lot of attention recently in...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
Typestate analysis relies on pointer analysis for detecting temporal memory safety errors, such as u...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Many source code tools help software programmers analyze programs as they are being developed, but s...
Reverse-engineering program binaries often relies on the recovery of high-level data abstractions. I...
We study the applicability of pointer analysis algorithms (originally aimed at optimizing compilers)...
Static type determination involves compile time calculation of the type of object a pointer may poin...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Pointer analysis, as a fundamental research, is to identify the possible runtime values of a pointer...
In this paper we propose a scheme that combines type inference and run-time checking to make existin...
Pointer analysis is a fundamental static program analysis, with a rich literature and wide applicati...
Static type determination involves compile time calculation of the type of object a pointer may poin...
Analyzing and optimizing programs from their executables has received a lot of attention recently in...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
Typestate analysis relies on pointer analysis for detecting temporal memory safety errors, such as u...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Many source code tools help software programmers analyze programs as they are being developed, but s...
Reverse-engineering program binaries often relies on the recovery of high-level data abstractions. I...
We study the applicability of pointer analysis algorithms (originally aimed at optimizing compilers)...
Static type determination involves compile time calculation of the type of object a pointer may poin...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
Pointer analysis, as a fundamental research, is to identify the possible runtime values of a pointer...
In this paper we propose a scheme that combines type inference and run-time checking to make existin...
Pointer analysis is a fundamental static program analysis, with a rich literature and wide applicati...
Static type determination involves compile time calculation of the type of object a pointer may poin...
Analyzing and optimizing programs from their executables has received a lot of attention recently in...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
Typestate analysis relies on pointer analysis for detecting temporal memory safety errors, such as u...