BAP: a binary analysis platform

作者: David Brumley , Ivan Jager , Thanassis Avgerinos , Edward J. Schwartz

DOI: 10.1007/978-3-642-22110-1_37

关键词:

摘要: … Perform binary-only symbolic execution. We are able to lift TEMU [5] instruction traces to our … is a static analysis. (It is still possible to use dynamic symbolic execution, however.) …

参考文章(11)
David Brumley, Thanassis Avgerinos, JongHyup Lee, TIE: Principled Reverse Engineering of Types in Binary Programs network and distributed system security symposium. ,(2011) , 10.1184/R1/6469466.V1
Maia Ginsburg, Andrew W. Appel, Modern Compiler Implementation in C ,(2007)
Nicholas Nethercote, Julian Seward, Valgrind: A Program Supervision Framework Electronic Notes in Theoretical Computer Science. ,vol. 89, pp. 44- 66 ,(2003) , 10.1016/S1571-0661(04)81042-9
Johannes Kinder, Helmut Veith, Jakstab: A Static Analysis Platform for Binaries computer aided verification. pp. 423- 427 ,(2008) , 10.1007/978-3-540-70545-1_40
Gogul Balakrishnan, Radu Gruian, Thomas Reps, Tim Teitelbaum, CodeSurfer/x86—A Platform for Analyzing x86 Executables Lecture Notes in Computer Science. pp. 250- 254 ,(2005) , 10.1007/978-3-540-31985-6_19
Aditya Thakur, Junghee Lim, Akash Lal, Amanda Burton, Evan Driscoll, Matt Elder, Tycho Andersen, Thomas Reps, Directed proof generation for machine code computer aided verification. pp. 288- 305 ,(2010) , 10.1007/978-3-642-14295-6_27
G. Balakrishnan, T. Reps, D. Melski, T. Teitelbaum, WYSINWYX: What You See Is Not What You eXecute verified software: theories, tools, experiments. pp. 202- 213 ,(2005) , 10.1007/978-3-540-69149-5_22
Balakrishnan Gogul, T Reps, D Melski, T Teitelbaum, WYSINWYX: What you see is not what you eXecute ACM Transactions on Programming Languages and Systems. ,vol. 32, pp. 23- ,(2010) , 10.1145/1749608.1749612
Vijay Ganesh, David L. Dill, A Decision Procedure for Bit-Vectors and Arrays Computer Aided Verification. pp. 519- 531 ,(2007) , 10.1007/978-3-540-73368-3_52
Edward J. Schwartz, Thanassis Avgerinos, David Brumley, All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) ieee symposium on security and privacy. pp. 317- 331 ,(2010) , 10.1109/SP.2010.26