String analysis for x86 binaries

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Format String Attack Prevention for Win32/X86 Binaries

A format string attack exploits the fact that functions with a variable number of input arguments such as printf() determine the exact number of input arguments used in a call based on the format string argument, and compromises the victim application’s address space by accessing data areas beyond the original input argument list the caller prepares. Although there have been several attempts th...

متن کامل

Differentiating Code from Data in x86 Binaries

Robust, static disassembly is an important part of achieving high coverage for many binary code analyses, such as reverse engineering, malware analysis, reference monitor in-lining, and software fault isolation. However, one of the major difficulties current disassemblers face is differentiating code from data when they are interleaved. This paper presents a machine learning-based disassembly a...

متن کامل

Automatic Application-Specific Sandboxing for Win32/X86 Binaries

Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits such software vulnerabilities as buffer overflow to grab the control of a victim application and possibly the underlying machine. The main barrier to the acceptance of this system call monitoring approach is the avail...

متن کامل

Vizer: A System to Vectorize Intel x86 Binaries

Traditional compilers conduct optimizations on intermediate representations derived from high level source code. However, it is sometimes necessary and fruitful to optimize executables or compiled object files. This paper describes the Vizer system which automatically vectorizes object code for the Intel x86 architecture. Binary optimization offers the opportunity to improve performance in situ...

متن کامل

An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries

It is well-known that static disassembly is an unsolved problem, but howmuch of a problem is it in real software— for instance, for binary protection schemes? This work studies the accuracy of nine state-of-the-art disassemblers on 981 real-world compiler-generated binaries with a wide variety of properties. In contrast, prior work focuses on isolated corner cases; we show that this has led to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGSOFT Software Engineering Notes

سال: 2006

ISSN: 0163-5948

DOI: 10.1145/1108768.1108814