Static disassembly of obfuscated binaries

C Kruegel, W Robertson, F Valeur… - USENIX security …, 2004 - usenix.org
Disassembly is the process of recovering a symbolic representation of a program's machine
code instructions from its binary representation. Recently, a number of techniques have …

Very fast containment of scanning worms, revisited

N Weaver, S Staniford, V Paxson - Malware Detection, 2007 - Springer
Computer worms—malicious, self-propagating programs—represent a significant threat to
large networks. One possible defense, containment, seeks to limit a worm's spread by …

{Semantically-Smart} Disk Systems

M Sivathanu, V Prabhakaran, FI Popovici… - … USENIX Conference on …, 2003 - usenix.org
We propose and evaluate the concept of a semantically-smart disk system (SDS). As
opposed to a traditional" smart" disk, an SDS has detailed knowledge of how the file system …

Understanding the GPU microarchitecture to achieve bare-metal performance tuning

X Zhang, G Tan, S Xue, J Li, K Zhou… - Proceedings of the 22nd …, 2017 - dl.acm.org
In this paper, we present a methodology to understand GPU microarchitectural features and
improve performance for compute-intensive kernels. The methodology relies on a reverse …

Automated synthesis of symbolic instruction encodings from I/O samples

P Godefroid, A Taly - ACM SIGPLAN Notices, 2012 - dl.acm.org
Symbolic execution is a key component of precise binary program analysis tools. We
discuss how to automatically boot-strap the construction of a symbolic execution engine for a …

Lifting assembly to intermediate representation: A novel approach leveraging compilers

N Hasabnis, R Sekar - Proceedings of the Twenty-First International …, 2016 - dl.acm.org
Translating low-level machine instructions into higher-level intermediate language (IL) is
one of the central steps in many binary analysis and instrumentation systems. Existing …

An empirical analysis of security and privacy risks in android cryptocurrency wallet apps

IWB Sentana, M Ikram, MA Kaafar - International Conference on Applied …, 2023 - Springer
A cryptocurrency wallet app is a piece of software that manages, stores, and generates
private keys of cryptocurrency accounts. With the provision of services such as easy access …

HOIST: A system for automatically deriving static analyzers for embedded systems

J Regehr, A Reid - ACM SIGPLAN Notices, 2004 - dl.acm.org
Embedded software must meet conflicting requirements such as be-ing highly reliable,
running on resource-constrained platforms, and being developed rapidly. Static program …

Applied cryptography and network security

M Tibouchi, X Wang - Proceedings of the 21st International Conference on …, 2023 - Springer
ACNS 2023, the 21st International Conference on Applied Cryptography and Network
Security, was held in Kyoto, Japan on June 19–22, 2023. The conference covered all …

[引用][C] 对构建Delaunay 三角网中凸壳算法的研究与改进

袁翰, 李伟波, 陈婷婷 - 计算机工程, 2007