Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers
暂无分享,去创建一个
[1] Cristina Cifuentes,et al. Walkabout: a retargetable dynamic binary translation framework , 2002 .
[2] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[3] Thomas Dullien,et al. REIL: A platform-independent intermediate representation of disassembled code for static code analysis , 2009 .
[4] R. Sekar,et al. Efficient fine-grained binary instrumentationwith applications to taint-tracking , 2008, CGO '08.
[5] David Brumley,et al. AEG: Automatic Exploit Generation , 2011, NDSS.
[6] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[7] George Candea,et al. Dynamically Translating x86 to LLVM using QEMU , 2010 .
[8] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[9] Axel Simon,et al. GDSL: A Universal Toolkit for Giving Semantics to Machine Language , 2013, APLAS.
[10] R. Sekar,et al. Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata , 2016, IEEE Transactions on Information Forensics and Security.
[11] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[12] Mingwei Zhang,et al. A platform for secure static binary instrumentation , 2014, VEE '14.
[13] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[14] Neha Narula,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, IEEE Symposium on Security and Privacy.
[15] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[16] Helmut Veith,et al. Jakstab: A Static Analysis Platform for Binaries , 2008, CAV.
[17] R. Sekar,et al. Fast Packet Classification Using Condition Factorization , 2009, ACNS.
[18] Axel Simon,et al. GDSL: A Generic Decoder Specification Language for Interpreting Machine Language , 2012, Electron. Notes Theor. Comput. Sci..
[19] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[20] Niranjan Hasabnis,et al. Checking correctness of code generator architecture specifications , 2015, 2015 IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
[21] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[22] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[23] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[24] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[25] Niranjan Hasabnis,et al. Extracting instruction semantics via symbolic execution of code generators , 2016, SIGSOFT FSE.
[26] I. V. Ramakrishnan,et al. Adaptive Pattern Matching , 1992, SIAM J. Comput..
[27] Antony I. T. Rowstron,et al. Vigilante: End-to-end containment of Internet worm epidemics , 2006, TOCS.
[28] Christian S. Collberg,et al. Reverse interpretation + mutation analysis = automatic retargeting , 1997, PLDI '97.
[29] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[30] Mingwei Zhang,et al. A Principled Approach for ROP Defense , 2015, ACSAC 2015.
[31] Christopher Krügel,et al. Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.
[32] Yuan-Shin Hwang,et al. DisIRer: Converting a retargetable compiler into a multiplatform binary translator , 2010, TACO.
[33] Thomas W. Reps,et al. CodeSurfer/x86-A Platform for Analyzing x86 Executables , 2005, CC.
[34] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[35] William C. Rounds,et al. Mappings and grammars on trees , 1970, Mathematical systems theory.
[36] James R. Larus,et al. EEL: machine-independent executable editing , 1995, PLDI '95.
[37] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[38] Dawson R. Engler,et al. Reverse-Engineering Instruction Encodings , 2001, USENIX Annual Technical Conference, General Track.
[39] Christopher W. Fraser,et al. Code selection through object code optimization , 1984, TOPL.
[40] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[41] Chien-Min Wang,et al. LnQ: Building High Performance Dynamic Binary Translators with Existing Compiler Backends , 2011, 2011 International Conference on Parallel Processing.
[42] Norman Ramsey,et al. The design of a resourceable and retargetable binary translator , 1999, Sixth Working Conference on Reverse Engineering (Cat. No.PR00303).
[43] Enrique Vidal,et al. Learning Subsequential Transducers for Pattern Recognition Interpretation Tasks , 1993, IEEE Trans. Pattern Anal. Mach. Intell..