A Dynamically Linked Library Based Indirect Call Function Analysis for Detecting Banned API Usage in Binary Code

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Could We Infer API Usage Patterns only using the Library Source Code?

Learning to use existing or new software libraries is a difficult task for software developers, which would impede their productivity. Much existing work has provided different techniques to mine API usage patterns from client programs in order to help developers on understanding and using existing libraries. However, considering only client programs to identify API usage patterns is a strong c...

متن کامل

Detecting Software Theft with API Call Sequence Sets

Software birthmarking uses a set of unique characteristics every program has upon creation to justify ownership claims of thefted software. This paper presents a novel birthmarking technique based on the interaction of a program with the standard API. We have used this technique to succesfully distinguish 4 different implementations of PNG image processing.

متن کامل

A Static Birthmark of Binary Executables Based on API Call Structure

A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static birthmark of binary executables based on API call structure. The program properties employed in this birthmark are functions and standard API calls when the functions are executed. The API calls from a function includes the API c...

متن کامل

a time-series analysis of the demand for life insurance in iran

با توجه به تجزیه و تحلیل داده ها ما دریافتیم که سطح درامد و تعداد نمایندگیها باتقاضای بیمه عمر رابطه مستقیم دارند و نرخ بهره و بار تکفل با تقاضای بیمه عمر رابطه عکس دارند

Rule-Based Source-Code Analysis For Detecting Security Vulnerabilities

Many security vulnerabilities related to source code have simple syntactic patterns or flow patterns that can be described as rules. In this paper, we propose a rule description language, RDL, in which we can specify simple syntactic patterns and data-flow and control-flow patterns that possibly lead to security vulnerabilities. We then introduce a universal static detector that can find the lo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Grid and Distributed Computing

سال: 2018

ISSN: 2005-4262,2005-4262

DOI: 10.14257/ijgdc.2018.11.3.07