From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

Limits of static analysis for malware detection

A Moser, C Kruegel, E Kirda - Twenty-third annual computer …, 2007 - ieeexplore.ieee.org
Malicious code is an increasingly important problem that threatens the security of computer
systems. The traditional line of defense against malware is composed of malware detectors …

[PDF][PDF] Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.

E Bauman, Z Lin, KW Hamlen - NDSS, 2018 - ndss-symposium.org
Static binary rewriting is a core technology for many systems and security applications,
including profiling, optimization, and software fault isolation. While many static binary …

Datalog disassembly

A Flores-Montoya, E Schulte - 29th USENIX Security Symposium …, 2020 - usenix.org
Disassembly is fundamental to binary analysis and rewriting. We present a novel
disassembly technique that takes a stripped binary and produces reassembleable assembly …

Automatic generation of peephole superoptimizers

S Bansal, A Aiken - ACM SIGARCH Computer Architecture News, 2006 - dl.acm.org
Peephole optimizers are typically constructed using human-written pattern matching rules,
an approach that requires expertise and time, as well as being less than systematic at …

Armlock: Hardware-based fault isolation for arm

Y Zhou, X Wang, Y Chen, Z Wang - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Software fault isolation (SFI) is an effective mechanism to confine untrusted modules inside
isolated domains to protect their host applications. Since its debut, researchers have …

BinRec: dynamic binary lifting and recompilation

A Altinay, J Nash, T Kroes, P Rajasekaran… - Proceedings of the …, 2020 - dl.acm.org
Binary lifting and recompilation allow a wide range of install-time program transformations,
such as security hardening, deobfuscation, and reoptimization. Existing binary lifting tools …

A compiler-level intermediate representation based binary analysis and rewriting system

K Anand, M Smithson, K Elwazeer, A Kotha… - Proceedings of the 8th …, 2013 - dl.acm.org
This paper presents component techniques essential for converting executables to a high-
level intermediate representation (IR) of an existing compiler. The compiler IR is then …

Efficient program execution indexing

B Xin, WN Sumner, X Zhang - ACM SIGPLAN Notices, 2008 - dl.acm.org
Execution indexing uniquely identifies a point in an execution. Desirable execution indices
reveal correlations between points in an execution and establish correspondence between …

Propeller: A profile guided, relinking optimizer for warehouse-scale applications

H Shen, K Pszeniczny, R Lavaee, S Kumar… - Proceedings of the 28th …, 2023 - dl.acm.org
While profile guided optimizations (PGO) and link time optimiza-tions (LTO) have been
widely adopted, post link optimizations (PLO) have languished until recently when …