Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers

[1]  Cristina Cifuentes,et al.  Walkabout: a retargetable dynamic binary translation framework , 2002 .

[2]  James Newsome,et al.  Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.

[3]  Thomas Dullien,et al.  REIL: A platform-independent intermediate representation of disassembled code for static code analysis , 2009 .

[4]  R. Sekar,et al.  Efficient fine-grained binary instrumentationwith applications to taint-tracking , 2008, CGO '08.

[5]  David Brumley,et al.  AEG: Automatic Exploit Generation , 2011, NDSS.

[6]  Martín Abadi,et al.  XFI: software guards for system address spaces , 2006, OSDI '06.

[7]  George Candea,et al.  Dynamically Translating x86 to LLVM using QEMU , 2010 .

[8]  Mingwei Zhang,et al.  Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.

[9]  Axel Simon,et al.  GDSL: A Universal Toolkit for Giving Semantics to Machine Language , 2013, APLAS.

[10]  R. Sekar,et al.  Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Nicholas Nethercote,et al.  Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.

[12]  Mingwei Zhang,et al.  A platform for secure static binary instrumentation , 2014, VEE '14.

[13]  Heng Yin,et al.  Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.

[14]  Neha Narula,et al.  Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, IEEE Symposium on Security and Privacy.

[15]  Derek Bruening,et al.  Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.

[16]  Helmut Veith,et al.  Jakstab: A Static Analysis Platform for Binaries , 2008, CAV.

[17]  R. Sekar,et al.  Fast Packet Classification Using Condition Factorization , 2009, ACNS.

[18]  Axel Simon,et al.  GDSL: A Generic Decoder Specification Language for Interpreting Machine Language , 2012, Electron. Notes Theor. Comput. Sci..

[19]  Fabrice Bellard,et al.  QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.

[20]  Niranjan Hasabnis,et al.  Checking correctness of code generator architecture specifications , 2015, 2015 IEEE/ACM International Symposium on Code Generation and Optimization (CGO).

[21]  Harish Patil,et al.  Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.

[22]  David Brumley,et al.  BAP: A Binary Analysis Platform , 2011, CAV.

[23]  Derek Bruening,et al.  Efficient, transparent, and comprehensive runtime code manipulation , 2004 .

[24]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[25]  Niranjan Hasabnis,et al.  Extracting instruction semantics via symbolic execution of code generators , 2016, SIGSOFT FSE.

[26]  I. V. Ramakrishnan,et al.  Adaptive Pattern Matching , 1992, SIAM J. Comput..

[27]  Antony I. T. Rowstron,et al.  Vigilante: End-to-end containment of Internet worm epidemics , 2006, TOCS.

[28]  Christian S. Collberg,et al.  Reverse interpretation + mutation analysis = automatic retargeting , 1997, PLDI '97.

[29]  Zhenkai Liang,et al.  BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.

[30]  Mingwei Zhang,et al.  A Principled Approach for ROP Defense , 2015, ACSAC 2015.

[31]  Christopher Krügel,et al.  Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.

[32]  Yuan-Shin Hwang,et al.  DisIRer: Converting a retargetable compiler into a multiplatform binary translator , 2010, TACO.

[33]  Thomas W. Reps,et al.  CodeSurfer/x86-A Platform for Analyzing x86 Executables , 2005, CC.

[34]  Cheng Wang,et al.  LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).

[35]  William C. Rounds,et al.  Mappings and grammars on trees , 1970, Mathematical systems theory.

[36]  James R. Larus,et al.  EEL: machine-independent executable editing , 1995, PLDI '95.

[37]  Heng Yin,et al.  Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.

[38]  Dawson R. Engler,et al.  Reverse-Engineering Instruction Encodings , 2001, USENIX Annual Technical Conference, General Track.

[39]  Christopher W. Fraser,et al.  Code selection through object code optimization , 1984, TOPL.

[40]  Christopher Krügel,et al.  Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.

[41]  Chien-Min Wang,et al.  LnQ: Building High Performance Dynamic Binary Translators with Existing Compiler Backends , 2011, 2011 International Conference on Parallel Processing.

[42]  Norman Ramsey,et al.  The design of a resourceable and retargetable binary translator , 1999, Sixth Working Conference on Reverse Engineering (Cat. No.PR00303).

[43]  Enrique Vidal,et al.  Learning Subsequential Transducers for Pattern Recognition Interpretation Tasks , 1993, IEEE Trans. Pattern Anal. Mach. Intell..