Assessment and analysis of software security flaws in virtual machines

CJ Wysopal, MP Moynahan, JR Stevenson - US Patent 8,613,080, 2013 - Google Patents
Security analysis and vulnerability testing results are “pack aged” or “bound to” the actual
software it describes. By linking the results to the software itself, downstream users of the …

Practical analysis of stripped binary code

LC Harris, BP Miller - ACM SIGARCH Computer Architecture News, 2005 - dl.acm.org
Executable binary code is the authoritative source of information about program content and
behavior. The compile, link, and optimize steps can cause a program's detailed execution …

[图书][B] A security architecture for survivability mechanisms

C Wang - 2001 - search.proquest.com
In survivability management systems, some management entities reside on application
hosts that are not necessarily trustworthy. The integrity of these software entities is essential …

[PDF][PDF] Machine-adaptable dynamic binary translation

D Ung, C Cifuentes - ACM Sigplan Notices, 2000 - dl.acm.org
Dynamic binary translation is the process of translating and optimizing executable code for
one machine to another at runtime, while the program is “executing” on the target machine …

Partial dead code elimination optimizations for program code conversion

IG Bolton, D Ung - US Patent 7,543,284, 2009 - Google Patents
An improved method and apparatus for performing program code conversion is provided
and, more particularly, for generating improved intermediate representations for use in …

Lifting assembly to intermediate representation: A novel approach leveraging compilers

N Hasabnis, R Sekar - Proceedings of the Twenty-First International …, 2016 - dl.acm.org
Translating low-level machine instructions into higher-level intermediate language (IL) is
one of the central steps in many binary analysis and instrumentation systems. Existing …

[PDF][PDF] JVM versus CLR: a comparative study

J Singer - PPPJ, 2003 - Citeseer
We present empirical evidence to demonstrate that there is little or no difference between
the Java Virtual Machine and the .NET Common Language Runtime, as regards the …

[PDF][PDF] Software tools

JC Grundy, JG Hosking - The Software Engineering …, 2001 - cs.auckland.ac.nz
Software is growing ever-more complex and new software processes, methods and products
put greater demands on software engineers than ever before. The support of appropriate …

Extracting instruction semantics via symbolic execution of code generators

N Hasabnis, R Sekar - Proceedings of the 2016 24th ACM SIGSOFT …, 2016 - dl.acm.org
Binary analysis and instrumentation form the basis of many tools and frameworks for
software debugging, security hardening, and monitoring. Accurate modeling of instruction …

Extreme pipeline and optimized reordering technology

EW Zwirner, GP Crocker, JC Kennel, TR Hoerig… - US Patent …, 2013 - Google Patents
The present invention relates to a binary translator for directly translating binary instructions
written for a legacy processor to executable binary instructions for a native processor. In …