From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …

Nibbler: debloating binary shared libraries

I Agadakos, D **, D Williams-King… - Proceedings of the 35th …, 2019 - dl.acm.org
Developers today have access to an arsenal of toolkits and libraries for rapid application
prototy**. However, when an application loads a library, the entirety of that library's code …

Backward-bounded DSE: targeting infeasibility questions on obfuscated codes

S Bardin, R David, JY Marion - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Software deobfuscation is a crucial activity in security analysis and especially in malware
analysis. While standard static and dynamic approaches suffer from well-known …

Towards static analysis of virtualization-obfuscated binaries

J Kinder - 2012 19th Working Conference on Reverse …, 2012 - ieeexplore.ieee.org
Virtualization-obfuscation protects a program from manual or automated analysis by
compiling it into byte code for a randomized virtual architecture and attaching a …

Static analysis of x86 executables

J Kinder - 2010 - infoscience.epfl.ch
Reasoning about programs is a cornerstone of computer science. We look at programs to
understand whether they are correct or contain bugs, to find out after what time they …