BitBlaze: A New Approach to Computer Security via Binary Analysis
暂无分享,去创建一个
Zhenkai Liang | Heng Yin | David Brumley | James Newsome | Dawn Xiaodong Song | Prateek Saxena | Juan Caballero | Pongsin Poosankam | Ivan Jager | Min Gyung Kang | P. Saxena | D. Song | David Brumley | Zhenkai Liang | J. Newsome | Heng Yin | Pongsin Poosankam | Juan Caballero | M. Kang | Ivan Jager
[1] Edsger W. Dijkstra,et al. A Discipline of Programming , 1976 .
[2] Daniel Jackson,et al. Chopping: A Generalization of Slicing , 1994 .
[3] Keith D. Cooper,et al. Value-driven redundancy elimination , 1996 .
[4] Steven S. Muchnick,et al. Advanced Compiler Design and Implementation , 1997 .
[5] David Seal,et al. ARM Architecture Reference Manual , 2001 .
[6] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[7] Dynamic binary analysis and instrumentation: or building tools is easy , 2004 .
[8] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[9] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[10] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[11] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[12] Thomas W. Reps,et al. CodeSurfer/x86-A Platform for Analyzing x86 Executables , 2005, CC.
[13] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[14] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[15] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[16] David Brumley,et al. Replayer: automatic protocol replay by binary analysis , 2006, CCS '06.
[17] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[18] Dawn Song,et al. Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software , 2006 .
[19] Yuanyuan Zhou,et al. Sweeper: a lightweight end-to-end system for defending against fast worms , 2007, EuroSys '07.
[20] Zhenkai Liang,et al. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation , 2007, USENIX Security Symposium.
[21] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[22] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[23] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[24] Hao Wang,et al. Creating Vulnerability Signatures Using Weakest Preconditions , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[25] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[26] Zhenkai Liang,et al. BitScope: Automatically Dissecting Malicious Binaries , 2007 .
[27] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[28] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[29] Zhenkai Liang,et al. Automatically Identifying Trigger-based Behavior in Malware , 2008, Botnet Detection.
[30] Thomas W. Reps,et al. WYSINWYX: What you see is not what you eXecute , 2005, TOPL.