Type inference on executables

J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in developing practical tools for comprehensive …

Mondrian memory protection

E Witchel, J Cates, K Asanović - … of the 10th international conference on …, 2002 - dl.acm.org
Mondrian memory protection (MMP) is a fine-grained protection scheme that allows multiple
protection domains to flexibly share memory and export protected services. In contrast to …

Dynamic binary analysis and instrumentation

N Nethercote - 2004 - cl.cam.ac.uk
Dynamic binary analysis (DBA) tools such as profilers and checkers help programmers
create better software. Dynamic binary instrumentation (DBI) frameworks make it easy to …

Off-device anti-malware protection for mobile devices

AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,918,881, 2014 - Google Patents
Techniques for off-device anti-malware protection for mobile devices are disclosed. In some
embodiments, off-device anti malware protection for mobile devices includes receiving a …

Decompilation of binary programs

C Cifuentes, KJ Gough - Software: Practice and Experience, 1995 - Wiley Online Library
The structure of a decompiler is presented, along with a thorough description of the different
modules that form part of a decompiler, and the type of analyses that are performed on the …

Native x86 decompilation using {Semantics-Preserving} structural analysis and iterative {Control-Flow} structuring

D Brumley, JH Lee, EJ Schwartz, M Woo - 22nd USENIX Security …, 2013 - usenix.org
There are many security tools and techniques for analyzing software, but many of them
require access to source code. We propose leveraging decompilation, the study of …

Assessment and analysis of software security flaws in virtual machines

CJ Wysopal, MP Moynahan, JR Stevenson - US Patent 8,613,080, 2013 - Google Patents
Security analysis and vulnerability testing results are “pack aged” or “bound to” the actual
software it describes. By linking the results to the software itself, downstream users of the …

Control flow-based malware variantdetection

S Cesare, Y Xiang, W Zhou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Static detection of malware variants plays an important role in system security and control
flow has been shown as an effective characteristic that represents polymorphic malware. In …

In-line filtering of insecure or unwanted mobile device software components or communications

AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,819,772, 2014 - Google Patents
Techniques for in-line filtering of insecure or unwanted mobile components or
communications (eg, insecure or unwanted behaviors associated with applications for …