Testing intermediate representations for binary analysis

S Kim, M Faerevaag, M Jung, S Jung… - 2017 32nd IEEE …, 2017 - ieeexplore.ieee.org
Binary lifting, which is to translate a binary executable to a high-level intermediate
representation, is a primary step in binary analysis. Despite its importance, there are only …

Scalable validation of binary lifters

S Dasgupta, S Dinesh, D Venkatesh, VS Adve… - Proceedings of the 41st …, 2020 - dl.acm.org
Validating the correctness of binary lifters is pivotal to gain trust in binary analysis, especially
when used in scenarios where correctness is important. Existing approaches focus on …

[PDF][PDF] B2R2: Building an efficient front-end for binary analysis

M Jung, S Kim, H Han, J Choi… - Proceedings of the NDSS …, 2019 - ndss-symposium.org
Current binary analysis research focuses mainly on the back-end, but not on the front-end.
However, we note that there are several key design points in the front-end that can greatly …

Efficient and safe control flow recovery using a restricted intermediate language

T Pfeffer, P Herber, L Druschke… - 2018 IEEE 27th …, 2018 - ieeexplore.ieee.org
Approaches for the automatic analysis of security policies on source code level cannot
trivially be applied to binaries. This is due to the lacking high-level semantics of low-level …

Free Willy: Prune System Calls to Enhance Software Security

C Groh, S Proskurin, A Zarras - Proceedings of the 38th ACM/SIGAPP …, 2023 - dl.acm.org
Many privilege escalation exploits on Linux abuse vulnerable system calls to threaten the
system's security. Therefore, various static and dynamic analysis based seccomp policy …

소프트웨어보안과바이너리분석

SG Cha - Communications of the Korean Institute of Information …, 2018 - koreascience.kr
는 상황을 생각해보자. 이러한 소안의 위협은 더이상 영화 속 상상이 아닌현실이라 말할 수
있다. 하지만, 소프트웨어 보안에 있어서의 핵심 기 '바이너리 분석” 이라는 것을 인식하고 있는 …

Virtualization-assisted Dynamic Binary Analysis and Operating System Security

S Proskurin - 2022 - mediatum.ub.tum.de
In this work, we explore novel virtualization-assisted techniques to further enhance their
capacity with regard to security. Specifically, we position our research around two main …

[图书][B] Secrecy included: confidentiality enforcement for machine code

TF Pfeffer - 2022 - search.proquest.com
Confidential software is an important requirement for the ongoing digitalization. Yet, since
confidentiality is a program-wide property, this requirement is at odds with modern software …