Formal Framework for Reasoning About the Precision of Dynamic Analysis

[1]  Jean-Yves Marion,et al.  How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections) , 2019, ACSAC.

[2]  Junfeng Yang,et al.  NEUZZ: Efficient Fuzzing with Neural Program Smoothing , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[3]  S. Byna,et al.  DART: distributed adaptive radix tree for efficient affix-based keyword search on HPC systems , 2018, PACT.

[4]  Chao Zhang,et al.  CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[5]  Mila Dalla Preda,et al.  Characterizing a property-driven obfuscation strategy , 2017, J. Comput. Secur..

[6]  Gilles Barthe,et al.  Reasoning about Probabilistic Defense Mechanisms against Remote Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[7]  Moritz Contag,et al.  Syntia: Synthesizing the Semantics of Obfuscated Code , 2017, USENIX Security Symposium.

[8]  Alexander Pretschner,et al.  Code obfuscation against symbolic execution attacks , 2016, ACSAC.

[9]  Kosta Serebryany,et al.  Continuous Fuzzing with libFuzzer and AddressSanitizer , 2016, 2016 IEEE Cybersecurity Development (SecDev).

[10]  Moritz Contag,et al.  Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows , 2016, DIMVA.

[11]  Stefan Katzenbeisser,et al.  Protecting Software through Obfuscation , 2016, ACM Comput. Surv..

[12]  Roberto Giacobazzi,et al.  Maximal incompleteness as obfuscation potency , 2016, Formal Aspects of Computing.

[13]  Barbara G. Ryder,et al.  A Formal Framework for Program Anomaly Detection , 2015, RAID.

[14]  Saumya Debray,et al.  A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.

[15]  Marco Torchiano,et al.  A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques , 2013, Empirical Software Engineering.

[16]  Roberto Giacobazzi,et al.  Obfuscation by partial evaluation of distorted interpreters , 2012, PEPM '12.

[17]  Kevin Coogan,et al.  Deobfuscation of virtualization-obfuscated software: a semantics-based approach , 2011, CCS '11.

[18]  Stefan Katzenbeisser,et al.  Code Obfuscation against Static and Dynamic Reverse Engineering , 2011, Information Hiding.

[19]  David Brumley,et al.  All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.

[20]  Christian S. Collberg,et al.  Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.

[21]  Roberto Giacobazzi,et al.  Semantics-based code obfuscation by abstract interpretation , 2009, J. Comput. Secur..

[22]  Jonathon T. Giffin,et al.  Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[23]  Arie van Deursen,et al.  A Systematic Survey of Program Comprehension through Dynamic Analysis , 2008, IEEE Transactions on Software Engineering.

[24]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[25]  Roberto Giacobazzi,et al.  Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking , 2008, 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods.

[26]  Stephen Drape,et al.  Slicing obfuscations: design, correctness, and evaluation , 2007, DRM '07.

[27]  Stephen Drape,et al.  Specifying Imperative Data Obfuscations , 2007, ISC.

[28]  Pedram Amini,et al.  Fuzzing: Brute Force Vulnerability Discovery , 2007 .

[29]  Luciano Baresi,et al.  An Introduction to Software Testing , 2006, FoVMT.

[30]  Roberto Giacobazzi,et al.  Semantic-Based Code Obfuscation by Abstract Interpretation , 2005, ICALP.

[31]  Koushik Sen,et al.  DART: directed automated random testing , 2005, PLDI '05.

[32]  Patrick Cousot,et al.  An abstract interpretation-based framework for software watermarking , 2004, POPL.

[33]  Susan Elliott Sim,et al.  Using benchmarking to advance research: a challenge to software engineering , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[34]  Norman Wilde,et al.  A comparison of methods for locating features in legacy software , 2003, J. Syst. Softw..

[35]  Roberto Giacobazzi,et al.  Making abstract interpretations complete , 2000, JACM.

[36]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[37]  Patrick Cousot,et al.  Constructive design of a hierarchy of semantics of a transition system by abstract interpretation , 2002, MFPS.

[38]  Patrick Cousot,et al.  Systematic design of program analysis frameworks , 1979, POPL.

[39]  Patrick Cousot,et al.  Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.