Securing Binary Code

The Zipr tool reverse-engineers binary code and applies specific and generic code transformations, with the goal of securing binary code.

[1]  Jack W. Davidson,et al.  Dynamic Canary Randomization for Improved Software Security , 2016, CISRC.

[2]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[3]  Richard Ford,et al.  Heartbleed 101 , 2014, IEEE Security & Privacy.

[4]  Jack W. Davidson,et al.  ILR: Where'd My Gadgets Go? , 2012, 2012 IEEE Symposium on Security and Privacy.

[5]  Mike Walker Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge , 2015 .

[6]  Barton P. Miller,et al.  Binary code is not easy , 2016, ISSTA.

[7]  Thomas G. Szymanski,et al.  Chaining Span-Dependent Jump Instructions , 1980, ACM Trans. Program. Lang. Syst..

[8]  Jason Hiser,et al.  Diversity in Cybersecurity , 2016, Computer.

[9]  Dan Boneh,et al.  Hacking Blind , 2014, 2014 IEEE Symposium on Security and Privacy.