Emscripten: an LLVM-to-JavaScript compiler

A Zakai - Proceedings of the ACM international conference …, 2011 - dl.acm.org
We present Emscripten, a compiler from LLVM (Low Level Virtual Machine) assembly to
JavaScript. This opens up two avenues for running code written in languages other than …

Analyzing memory accesses in x86 executables

G Balakrishnan, T Reps - International conference on compiler …, 2004 - Springer
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the
work is to recover intermediate representations that are similar to those that can be created …

Wysinwyx: What you see is not what you execute

G Balakrishnan, T Reps - ACM Transactions on Programming …, 2010 - dl.acm.org
Over the last seven years, we have developed static-analysis methods to recover a good
approximation to the variables and dynamically allocated memory objects of a stripped …

Native x86 decompilation using {Semantics-Preserving} structural analysis and iterative {Control-Flow} structuring

D Brumley, JH Lee, EJ Schwartz, M Woo - 22nd USENIX Security …, 2013 - usenix.org
There are many security tools and techniques for analyzing software, but many of them
require access to source code. We propose leveraging decompilation, the study of …

Assessment and analysis of software security flaws in virtual machines

CJ Wysopal, MP Moynahan, JR Stevenson - US Patent 8,613,080, 2013 - Google Patents
Security analysis and vulnerability testing results are “pack aged” or “bound to” the actual
software it describes. By linking the results to the software itself, downstream users of the …

Helping johnny to analyze malware: A usability-optimized decompiler and malware analysis user study

K Yakdan, S Dechand… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Analysis of malicious software is an essential task in computer security, it provides the
necessary understanding to devise effective countermeasures and mitigation strategies. The …

[图书][B] Malicious cryptography: Exposing cryptovirology

A Young, M Yung - 2004 - books.google.com
Hackers have uncovered the dark side of cryptography—that device developed to defeat
Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the …

Codesurfer/x86—a platform for analyzing x86 executables

G Balakrishnan, R Gruian, T Reps… - … conference on compiler …, 2005 - Springer
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis
algorithm called value-set analysis (VSA) to recover intermediate representations that are …

Wysinwyx: What you see is not what you execute

G Balakrishnan, T Reps, D Melski… - Working Conference on …, 2005 - Springer
Abstract What You See Is Not What You eXecute: computers do not execute source-code
programs; they execute machine-code programs that are generated from source code. Not …

Recovery of jump table case statements from binary code

C Cifuentes, M Van Emmerik - Science of Computer Programming, 2001 - Elsevier
One of the fundamental problems with the static analysis of binary (executable) code is that
of recognizing, in a machine-independent way, the target addresses of n-conditional …