String analysis for x86 binaries
نویسندگان
چکیده
منابع مشابه
Automated Format String Attack Prevention for Win32/X86 Binaries
A format string attack exploits the fact that functions with a variable number of input arguments such as printf() determine the exact number of input arguments used in a call based on the format string argument, and compromises the victim application’s address space by accessing data areas beyond the original input argument list the caller prepares. Although there have been several attempts th...
متن کاملDifferentiating Code from Data in x86 Binaries
Robust, static disassembly is an important part of achieving high coverage for many binary code analyses, such as reverse engineering, malware analysis, reference monitor in-lining, and software fault isolation. However, one of the major difficulties current disassemblers face is differentiating code from data when they are interleaved. This paper presents a machine learning-based disassembly a...
متن کاملAutomatic Application-Specific Sandboxing for Win32/X86 Binaries
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits such software vulnerabilities as buffer overflow to grab the control of a victim application and possibly the underlying machine. The main barrier to the acceptance of this system call monitoring approach is the avail...
متن کاملVizer: A System to Vectorize Intel x86 Binaries
Traditional compilers conduct optimizations on intermediate representations derived from high level source code. However, it is sometimes necessary and fruitful to optimize executables or compiled object files. This paper describes the Vizer system which automatically vectorizes object code for the Intel x86 architecture. Binary optimization offers the opportunity to improve performance in situ...
متن کاملAn In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
It is well-known that static disassembly is an unsolved problem, but howmuch of a problem is it in real software— for instance, for binary protection schemes? This work studies the accuracy of nine state-of-the-art disassemblers on 981 real-world compiler-generated binaries with a wide variety of properties. In contrast, prior work focuses on isolated corner cases; we show that this has led to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGSOFT Software Engineering Notes
سال: 2006
ISSN: 0163-5948
DOI: 10.1145/1108768.1108814