Type inference on executables
J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …
available, and the only thing that we can access is the program executable. A fundamental …
S2E: A platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in developing practical tools for comprehensive …
systems. We demonstrate S2E's use in developing practical tools for comprehensive …
Mondrian memory protection
E Witchel, J Cates, K Asanović - … of the 10th international conference on …, 2002 - dl.acm.org
Mondrian memory protection (MMP) is a fine-grained protection scheme that allows multiple
protection domains to flexibly share memory and export protected services. In contrast to …
protection domains to flexibly share memory and export protected services. In contrast to …
Dynamic binary analysis and instrumentation
N Nethercote - 2004 - cl.cam.ac.uk
Dynamic binary analysis (DBA) tools such as profilers and checkers help programmers
create better software. Dynamic binary instrumentation (DBI) frameworks make it easy to …
create better software. Dynamic binary instrumentation (DBI) frameworks make it easy to …
Off-device anti-malware protection for mobile devices
AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,918,881, 2014 - Google Patents
Techniques for off-device anti-malware protection for mobile devices are disclosed. In some
embodiments, off-device anti malware protection for mobile devices includes receiving a …
embodiments, off-device anti malware protection for mobile devices includes receiving a …
Decompilation of binary programs
C Cifuentes, KJ Gough - Software: Practice and Experience, 1995 - Wiley Online Library
The structure of a decompiler is presented, along with a thorough description of the different
modules that form part of a decompiler, and the type of analyses that are performed on the …
modules that form part of a decompiler, and the type of analyses that are performed on the …
Native x86 decompilation using {Semantics-Preserving} structural analysis and iterative {Control-Flow} structuring
There are many security tools and techniques for analyzing software, but many of them
require access to source code. We propose leveraging decompilation, the study of …
require access to source code. We propose leveraging decompilation, the study of …
Assessment and analysis of software security flaws in virtual machines
CJ Wysopal, MP Moynahan, JR Stevenson - US Patent 8,613,080, 2013 - Google Patents
Security analysis and vulnerability testing results are “pack aged” or “bound to” the actual
software it describes. By linking the results to the software itself, downstream users of the …
software it describes. By linking the results to the software itself, downstream users of the …
Control flow-based malware variantdetection
Static detection of malware variants plays an important role in system security and control
flow has been shown as an effective characteristic that represents polymorphic malware. In …
flow has been shown as an effective characteristic that represents polymorphic malware. In …
In-line filtering of insecure or unwanted mobile device software components or communications
AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,819,772, 2014 - Google Patents
Techniques for in-line filtering of insecure or unwanted mobile components or
communications (eg, insecure or unwanted behaviors associated with applications for …
communications (eg, insecure or unwanted behaviors associated with applications for …