International Symposium on Code Generation and Optimization (CGO'06)
DOI: 10.1109/cgo.2006.6
|View full text |Cite
|
Sign up to set email alerts
|

BIRD: Binary Interpretation using Runtime Disassembly

Abstract: The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to automatically detect or eliminate such vulnerabilities. So far, most of them cannot be applied to commercially distributed applications on the Windows/x86 platform, because it is almost impossible to disassemble a binary file with 100% accuracy and coverage on that platform. This paper presents the design, implementation, and evaluation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
65
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(65 citation statements)
references
References 12 publications
0
65
0
Order By: Relevance
“…In the context of dynamic instrumentation, Nanda et al proposed to resolve indirect branches at runtime, when the concrete jump target has already been computed [16]. In this paper, we generalize this idea to combining over-approximate static analysis with under-approximation and alternating between the two for resolving jump targets.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…In the context of dynamic instrumentation, Nanda et al proposed to resolve indirect branches at runtime, when the concrete jump target has already been computed [16]. In this paper, we generalize this idea to combining over-approximate static analysis with under-approximation and alternating between the two for resolving jump targets.…”
Section: Introductionmentioning
confidence: 98%
“…Nanda et al introduced hybrid disassembly in their tool BIRD [16]. They first use a heuristic disassembly algorithm to identify likely code regions in an executable.…”
Section: Related Workmentioning
confidence: 99%
“…Having direct access to the IR yields two significant advantages. First, it allows the runtime to avoid disassembling the binary, which can be difficult or impossible without access to fine-grain information about the executing code paths [47,48]. Second, the alternative of hoisting the binary to IR, as is done in prior work, loses important semantic information and limits the flexibility of the compiler [46].…”
Section: A Protean Code Compilermentioning
confidence: 99%
“…Disassembly research concentrates on algorithm improvements at home and abroad, such as static disassembly combined with machine learning [3] , error detection via control flow [4] , mixed disassembly method [5] , disassembly based on speculation [6] , etc. For the research of the reliability of the software for the smart meter, Zhejiang Electric Power Research Institute [7] utilize cross test strategy to test the software.…”
Section: Related Workmentioning
confidence: 99%
“…CppCheck has very good expansibility, using the open regular expression library PCRE. PCRE implements the detection of defects in lexical analysis phase, and then according to the value of the linener object Token to achieve the scalability of the defect mode [6] . The rest of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%