[PDF][PDF] IntScope: Automatically detecting integer overflow vulnerability in X86 binary using symbolic execution.

T Wang, T Wei, Z Lin, W Zou - NDSS, 2009 - zhiqlin.github.io
The number of identified integer overflow vulnerabilities has been increasing rapidly in
recent years. In this paper, we present a system, IntScope, which can automatically detect …

{MAZE}: Towards automated heap feng shui

Y Wang, C Zhang, Z Zhao, B Zhang, X Gong… - 30th USENIX Security …, 2021 - usenix.org
A large number of memory corruption vulnerabilities, eg, heap overflow and use after free
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …

Cost analysis of object-oriented bytecode programs

E Albert, P Arenas, S Genaim, G Puebla… - Theoretical Computer …, 2012 - Elsevier
Cost analysis statically approximates the cost of programs in terms of their input data size.
This paper presents, to the best of our knowledge, the first approach to the automatic cost …

Analyzing runtime and size complexity of integer programs

M Brockschmidt, F Emmes, S Falke, C Fuhs… - ACM Transactions on …, 2016 - dl.acm.org
We present a modular approach to automatic complexity analysis of integer programs.
Based on a novel alternation between finding symbolic time bounds for program parts and …

COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode

E Albert, P Arenas, S Genaim, G Puebla… - … Symposium on Formal …, 2007 - Springer
This paper describes the architecture of costa, an abstract interpretation based cos t and t
ermination a nalyzer for Java bytecode. The system receives as input a bytecode program,(a …

Static analysis of energy consumption for LLVM IR programs

N Grech, K Georgiou, J Pallister, S Kerrison… - Proceedings of the 18th …, 2015 - dl.acm.org
Energy models can be constructed by characterizing the energy consumed when executing
each instruction in a processor's instruction set. This can be used to determine how much …

Decomperson: How humans decompile and what we can learn from it

K Burk, F Pagani, C Kruegel, G Vigna - 31st USENIX Security …, 2022 - usenix.org
Human analysts must reverse engineer binary programs as a prerequisite for a number of
security tasks, such as vulnerability analysis, malware detection, and firmware re-hosting …

Static analysis of jni programs via binary decompilation

J Park, S Lee, J Hong, S Ryu - IEEE Transactions on Software …, 2023 - ieeexplore.ieee.org
JNI programs are widely used thanks to the combined benefits of C and Java programs.
However, because understanding the interaction behaviors between two different …

[HTML][HTML] Survey of techniques to detect common weaknesses in program binaries

A Adhikari, P Kulkarni - Cyber Security and Applications, 2025 - Elsevier
Software vulnerabilities resulting from coding weaknesses and poor development practices
are common. Attackers can exploit these vulnerabilities and impact the security and privacy …

Finding missed compiler optimizations by differential testing

G Barany - Proceedings of the 27th international conference on …, 2018 - dl.acm.org
Randomized differential testing of compilers has had great success in finding compiler
crashes and silent miscompilations. In this paper we investigate whether we can use similar …