Binary-code obfuscations in prevalent packer tools
The first steps in analyzing defensive malware are understanding what obfuscations are
present in real-world malware binaries, how these obfuscations hinder analysis, and how …
present in real-world malware binaries, how these obfuscations hinder analysis, and how …
Sok:(state of) the art of war: Offensive techniques in binary analysis
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …
level, semantically rich information about data structures and control constructs makes the …
Type inference on executables
J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …
available, and the only thing that we can access is the program executable. A fundamental …
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …
even developers who rely on third-party libraries. Such analysis relies on automatic …
Practical control flow integrity and randomization for binary executables
Control Flow Integrity (CFI) provides a strong protection against modern control-flow
hijacking attacks. However, performance and compatibility issues limit its adoption. We …
hijacking attacks. However, performance and compatibility issues limit its adoption. We …
Obfuscation of executable code to improve resistance to static disassembly
C Linn, S Debray - Proceedings of the 10th ACM conference on …, 2003 - dl.acm.org
A great deal of software is distributed in the form of executable code. The ability to reverse
engineer such executables can create opportunities for theft of intellectual property via …
engineer such executables can create opportunities for theft of intellectual property via …
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …
software. Over the past few decades, research in binary disassembly has produced many …
[图书][B] Modern compiler design
" Modern Compiler Design" makes the topic of compiler design more accessible by focusing
on principles and techniques of wide application. By carefully distinguishing between the …
on principles and techniques of wide application. By carefully distinguishing between the …
Disassembly of executable code revisited
Machine code disassembly routines form a fundamental component of software systems that
statically analyze or modify executable programs, eg, reverse engineering systems, static …
statically analyze or modify executable programs, eg, reverse engineering systems, static …
Binary code is not easy
Binary code analysis is an enabling technique for many applications. Modern compilers and
run-time libraries have introduced significant complexities to binary code, which negatively …
run-time libraries have introduced significant complexities to binary code, which negatively …