2000
DOI: 10.1109/2.825697
|View full text |Cite
|
Sign up to set email alerts
|

UQBT: adaptable binary translation at low cost

Abstract: Figure 5. UQBT uses PAL to perform parameter analysis of (a) a sequence of Sparc RTLs, to produce (b) HRTL code. From the HRTL, UQBT can generate code for other processors.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2003
2003
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 99 publications
(58 citation statements)
references
References 9 publications
0
58
0
Order By: Relevance
“…Also, since program binaries can be instrumented [4,20], we can avoid requiring program source code. While this approach remains subject to the limitations of dynamic information, it can yield impact sets that are more accurate relative to a specific operational profile.…”
Section: Dynamic Whole Program Path-based Impact Analysismentioning
confidence: 99%
“…Also, since program binaries can be instrumented [4,20], we can avoid requiring program source code. While this approach remains subject to the limitations of dynamic information, it can yield impact sets that are more accurate relative to a specific operational profile.…”
Section: Dynamic Whole Program Path-based Impact Analysismentioning
confidence: 99%
“…When the branch targets are not obvious due to obfuscations, then it is not trivial to determine control flow. To address this issue, an extension called speculative disassembly was proposed by Cifuentes et al [12], which as the name suggests attempts to determine via a linear sweep style disassembly whether a portion of the byte stream could be a potential control flow target. This is similar to our approach since the main idea is to reason whether a stream of bytes can be executable code.…”
Section: Related Workmentioning
confidence: 99%
“…To handle this problem, some systems, e.g., the UQBT binary translation system [5], resort to "speculative disassembly." The idea is to process undisassembled portions of the text segment that appear to be code, in the expectation that they might be the targets of indirect function calls; a "speculative bit" is set when this is done, and speculative disassembly of a particular region of memory is abandoned if an invalid instruction is encountered.…”
Section: Recursive Traversalmentioning
confidence: 99%