X-force: force-executing binary programs for security applications

作者: Zhendong Su , Dongyan Xu , Zhiqiang Lin , Zhui Deng , Xiangyu Zhang

DOI:

关键词:

摘要: … We believe this paper is just an initial step in developing a unique type of program analysis different from the traditional static, dynamic, and symbolic analysis. We have a number of …

参考文章(41)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Exposing Security Risks for Commercial Mobile Devices Lecture Notes in Computer Science. pp. 3- 21 ,(2012) , 10.1007/978-3-642-33704-8_2
Thomas Raffetseder, Christopher Kruegel, Engin Kirda, Detecting System Emulators Lecture Notes in Computer Science. pp. 1- 18 ,(2007) , 10.1007/978-3-540-75496-1_1
Bart Demoen, Bruno De Bus, Bjorn De Sutter, Koenraad De Bosschere, P. Keyngnaert, On the static analysis of indirect control transfers in binaries parallel and distributed processing techniques and applications. ,vol. 2, pp. 1013- 1019 ,(2000)
Xuxian Jiang, Dongyan Xu, Zhiqiang Lin, Xiangyu Zhang, Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. network and distributed system security symposium. ,(2008)
David Brumley, Thanassis Avgerinos, JongHyup Lee, TIE: Principled Reverse Engineering of Types in Binary Programs network and distributed system security symposium. ,(2011) , 10.1184/R1/6469466.V1
Zhui Deng, Xiangyu Zhang, Dongyan Xu, BISTRO: Binary Component Extraction and Embedding for Software Security Applications european symposium on research in computer security. pp. 200- 218 ,(2013) , 10.1007/978-3-642-40203-6_12
David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin, Automatically Identifying Trigger-based Behavior in Malware Botnet Detection. pp. 65- 88 ,(2008) , 10.1007/978-0-387-68768-1_4
Martin Rinard, Cristian Cadar, William S. Beebee, Daniel M. Roy, Tudor Leu, Daniel Dumitran, Enhancing server availability and security through failure-oblivious computing operating systems design and implementation. pp. 21- 21 ,(2004)
Weidong Cui, Helen J. Wang, Jayanthkumar Kannan, Discoverer: automatic protocol reverse engineering from network traces usenix security symposium. pp. 14- ,(2007)
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace, ReFormat: automatic reverse engineering of encrypted messages european symposium on research in computer security. pp. 200- 215 ,(2009) , 10.1007/978-3-642-04444-1_13