Binary-code obfuscations in prevalent packer tools

KA Roundy, BP Miller - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
The first steps in analyzing defensive malware are understanding what obfuscations are
present in real-world malware binaries, how these obfuscations hinder analysis, and how …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

Type inference on executables

J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …

Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization

S Dinesh, N Burow, D Xu… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …

Practical control flow integrity and randomization for binary executables

C Zhang, T Wei, Z Chen, L Duan… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Control Flow Integrity (CFI) provides a strong protection against modern control-flow
hijacking attacks. However, performance and compatibility issues limit its adoption. We …

Obfuscation of executable code to improve resistance to static disassembly

C Linn, S Debray - Proceedings of the 10th ACM conference on …, 2003 - dl.acm.org
A great deal of software is distributed in the form of executable code. The ability to reverse
engineer such executables can create opportunities for theft of intellectual property via …

Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask

C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …

[图书][B] Modern compiler design

D Grune, K Van Reeuwijk, HE Bal, CJH Jacobs… - 2012 - books.google.com
" Modern Compiler Design" makes the topic of compiler design more accessible by focusing
on principles and techniques of wide application. By carefully distinguishing between the …

Disassembly of executable code revisited

B Schwarz, S Debray, G Andrews - Ninth Working Conference …, 2002 - ieeexplore.ieee.org
Machine code disassembly routines form a fundamental component of software systems that
statically analyze or modify executable programs, eg, reverse engineering systems, static …

Binary code is not easy

X Meng, BP Miller - Proceedings of the 25th International Symposium on …, 2016 - dl.acm.org
Binary code analysis is an enabling technique for many applications. Modern compilers and
run-time libraries have introduced significant complexities to binary code, which negatively …