Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Syste 2020
DOI: 10.1145/3373376.3378470
|View full text |Cite
|
Sign up to set email alerts
|

Egalito

Abstract: For comprehensive analysis of all executable code, and fast turn-around time for transformations, it is essential to operate directly on binaries to enable profiling, security hardening, and architectural adaptation. Disassembling binaries is difficult, and prior work relies on a process virtual machine to translate references on the fly or inefficient binary code patching. Our Egalito recompiler leverages metadata present in current stripped x86_64 and ARM64 binaries to generate a complete disassembly, and al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…All analyses operate on binary code. Static analyses are based on the Egalito [56] framework, while dynamic analyses use Intel's Pin [34] framework.…”
Section: Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…All analyses operate on binary code. Static analyses are based on the Egalito [56] framework, while dynamic analyses use Intel's Pin [34] framework.…”
Section: Overviewmentioning
confidence: 99%
“…To identify all loops, we employ the Egalito [56] binary-analysis tool to statically disassemble applications and libraries, and extract the control-flow graph (CFG) of each function of the application and its libraries. We focus on loops produced using: for() {}, while() {}, do{} while(), and goto statements.…”
Section: Loops Identificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Binary memory dependence analysis, which determines whether two machine instructions in an executable can access the same memory location, is critical for many security-sensitive tasks, including detecting vulnerabilities [18,36,86], analyzing malware [38,93], hardening binaries [4,29,44,90], and forensics [19,35,58,91].…”
Section: Introductionmentioning
confidence: 99%