P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
暂无分享,去创建一个
Fei Peng | Vinod Yegneswaran | Xiangyu Zhang | Kyungtae Kim | Dongyan Xu | Dohyeong Kim | Yonghwi Kwon | John Qian
[1] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[2] Helen J. Wang,et al. Tupni: automatic reverse engineering of input formats , 2008, CCS.
[3] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[4] Thomas W. Reps,et al. Extracting Output Formats from Executables , 2006, 2006 13th Working Conference on Reverse Engineering.
[5] Christopher Krügel,et al. Automatic Network Protocol Analysis , 2008, NDSS.
[6] Thomas W. Reps,et al. Improved Memory-Access Analysis for x86 Executables , 2008, CC.
[7] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[8] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[9] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[10] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[11] Zhi Wang,et al. ReFormat: Automatic Reverse Engineering of Encrypted Messages , 2009, ESORICS.
[12] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[13] Polyglot : Automatic Extraction of Protocol Format using Dynamic Binary Analysis , 2007 .
[14] Fei Peng,et al. X-Force: Force-Executing Binary Programs for Security Applications , 2014, USENIX Security Symposium.
[15] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[16] Christopher Krügel,et al. Prospex: Protocol Specification Extraction , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[17] Thomas W. Reps,et al. Checking conformance of a producer and a consumer , 2011, ESEC/FSE '11.
[18] Xiangyu Zhang,et al. Deriving input syntactic structure from execution , 2008, SIGSOFT '08/FSE-16.
[19] Xuxian Jiang,et al. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution , 2008, NDSS.
[20] Christopher Krügel,et al. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries , 2010, 2010 IEEE Symposium on Security and Privacy.
[21] Thomas W. Reps,et al. DIVINE: DIscovering Variables IN Executables , 2007, VMCAI.
[22] Dawn Xiaodong Song,et al. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering , 2009, CCS.