It is well-known that static disassembly is an unsolved problem, but how much of a problem is it in real software—for instance, for binary protection schemes? This work studies the accuracy of nine state-of-the-art disassemblers on 981 real-world compiler-generated binaries with a wide variety of properties. In contrast, prior work focuses on isolated corner cases; we show that this has led to a widespread and overly pessimistic view on the prevalence of complex constructs like inline data and overlapping code, leading reviewers and researchers to underestimate the potential of binary-based research. On the other hand, some constructs, such as function boundaries, are much harder to recover accurately than is reflected in the literature, wh...
Binary lifting and recompilation allow a wide range of install-Time program transformations, such as...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Code coverage analysis plays an important role in the software testing process. More recently, the r...
Machine code disassembly routines form a fundamental component of software systems that statically a...
There are many security tools and techniques for finding bugs, but many of them assume access to sou...
Legacy binaries that do not have source code remain a vital part of our software ecosystem. Lifting ...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
The problem of correctly recovering assembly instructions from a binary has received much attention ...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
International audienceFighting malware involves analyzing large numbers of suspicious binary files. ...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
Abstract. A probabilistic finite state machine approach to statically disassem-bling x86 machine lan...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
This study introduces a static binary rewriting method for improving security of executable binaries...
Binary lifting and recompilation allow a wide range of install-Time program transformations, such as...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Code coverage analysis plays an important role in the software testing process. More recently, the r...
Machine code disassembly routines form a fundamental component of software systems that statically a...
There are many security tools and techniques for finding bugs, but many of them assume access to sou...
Legacy binaries that do not have source code remain a vital part of our software ecosystem. Lifting ...
This dissertation is concerned with static analysis of binary executables in a theoretically well-fo...
The problem of correctly recovering assembly instructions from a binary has received much attention ...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
International audienceFighting malware involves analyzing large numbers of suspicious binary files. ...
A great deal of software is distributed in the form of executable code. The ability to reverse engin...
Abstract. A probabilistic finite state machine approach to statically disassem-bling x86 machine lan...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
This study introduces a static binary rewriting method for improving security of executable binaries...
Binary lifting and recompilation allow a wide range of install-Time program transformations, such as...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Code coverage analysis plays an important role in the software testing process. More recently, the r...