Precise static analysis of untrusted driver binaries
暂无分享,去创建一个
[1] Helmut Veith,et al. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries , 2008, VMCAI.
[2] Shane Sendall,et al. Specifying the semantics of machine instructions , 1998, Proceedings. 6th International Workshop on Program Comprehension. IWPC'98 (Cat. No.98TB100242).
[3] Sriram K. Rajamani,et al. Thorough static analysis of device drivers , 2006, EuroSys.
[4] Thomas W. Reps,et al. Recency-Abstraction for Heap-Allocated Storage , 2006, SAS.
[5] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[6] Sorin Lerner,et al. ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.
[7] Thomas A. Henzinger,et al. Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis , 2007, CAV.
[8] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[9] Mark N. Wegman,et al. Analysis of pointers and structures , 1990, SIGP.
[10] Thomas A. Henzinger,et al. Program Analysis with Dynamic Precision Adjustment , 2008, 2008 23rd IEEE/ACM International Conference on Automated Software Engineering.
[11] Thomas W. Reps,et al. Analyzing Stripped Device-Driver Executables , 2008, TACAS.
[12] Mike Van Emmerik,et al. Using a decompiler for real-world source recovery , 2004, 11th Working Conference on Reverse Engineering.
[13] Helmut Veith,et al. Jakstab: A Static Analysis Platform for Binaries , 2008, CAV.