WYSINWYX: What You See Is Not What You eXecute

作者: G. Balakrishnan , T. Reps , D. Melski , T. Teitelbaum

DOI: 10.1007/978-3-540-69149-5_22

关键词:

摘要: Over the last seven years, we have developed static-analysis methods to recover a good approximation to the variables and dynamically allocated memory objects of a stripped …

参考文章(38)
Polle Trescott Zellweger, Interactive source-level debugging for optimized programs (compilation, high-level) University of California, Berkeley. ,(1984)
R.T. Gerth, Formal verification of self modifying code international conference for young computer scientists. pp. 305- 313 ,(1991)
Thomas W. Reps, Nicholas Kidd, David Melski, Akash Lal, WPDS++: A C++ library for weighted pushdown systems ,(2005)
C. Cifuentes, A. Fraboulet, Intraprocedural static slicing of binary executables international conference on software maintenance. pp. 188- 195 ,(1997) , 10.1109/ICSM.1997.624245
Xavier Rival, Abstract Interpretation-Based Certification of Assembly Code verification model checking and abstract interpretation. pp. 41- 55 ,(2002) , 10.1007/3-540-36384-X_7
Akash Lal, Thomas Reps, Gogul Balakrishnan, Extended Weighted Pushdown Systems Computer Aided Verification. pp. 434- 448 ,(2005) , 10.1007/11513988_44
Thomas Ball, Sriram K. Rajamani, The SLAM Toolkit computer aided verification. pp. 260- 264 ,(2001) , 10.1007/3-540-44585-4_25
Eric A. Brewer, Alexander Aiken, David A. Wagner, Jeffrey S. Foster, A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. network and distributed system security symposium. ,(2000)
Gogul Balakrishnan, Thomas Reps, Analyzing Memory Accesses in x86 Executables compiler construction. pp. 5- 23 ,(2006) , 10.1007/978-3-540-24723-4_2
Ahmed Bouajjani, Javier Esparza, Oded Maler, Reachability Analysis of Pushdown Automata: Application to Model-Checking international conference on concurrency theory. pp. 135- 150 ,(1997) , 10.1007/3-540-63141-0_10