BIRD: binary interpretation using runtime disassembly
暂无分享,去创建一个
Tzi-cker Chiueh | Wei Li | Lap-Chung Lam | Susanta Nanda | T. Chiueh | Susanta Nanda | L. Lam | Wei Li
[1] Alec Wolman,et al. Instrumentation and optimization of Win32/intel executables using Etch , 1997 .
[2] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[3] Gregory R. Andrews,et al. PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture , 2007 .
[4] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[5] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[6] Evelyn Duesterwald,et al. Design and implementation of a dynamic optimization framework for windows , 2000 .
[7] Amitabh Srivastava,et al. Vulcan Binary transformation in a distributed environment , 2001 .
[8] Prasad Dabak,et al. Undocumented Windows NT , 1999 .
[9] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[10] Cristina Cifuentes,et al. Recovery of jump table case statements from binary code , 1999, Proceedings Seventh International Workshop on Program Comprehension.
[11] David W. Wall,et al. A practical system fljr intermodule code optimization at link-time , 1993 .
[12] Kevin Skadron,et al. Low-overhead Software Dynamic Translation , 2001 .
[13] Doug Simon,et al. Preliminary experience with the use of the UQBT binary translation framework , 1999, PACT 1999.
[14] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[15] Jack W. Davidson,et al. Strata: A Software Dynamic Translation Infrastructure , 2001 .
[16] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[17] Mendel Rosenblum,et al. Embra: fast and flexible machine simulation , 1996, SIGMETRICS '96.
[18] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[19] Gregory R. Ganger,et al. Designing computer systems with MEMS-based storage , 2000, ASPLOS.
[20] Tzi-cker Chiueh,et al. Automatic extraction of accurate application-specific sandboxing policy , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[21] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[22] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[23] Koen De Bosschere,et al. DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications , 2002, PACT 2002.
[24] Jeffrey K. Hollingsworth,et al. An API for Runtime Code Patching , 2000, Int. J. High Perform. Comput. Appl..
[25] James R. Larus,et al. EEL: machine-independent executable editing , 1995, PLDI '95.