From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …

Nibbler: debloating binary shared libraries

I Agadakos, D **, D Williams-King… - Proceedings of the 35th …, 2019 - dl.acm.org
Developers today have access to an arsenal of toolkits and libraries for rapid application
prototy**. However, when an application loads a library, the entirety of that library's code …

Backward-bounded DSE: targeting infeasibility questions on obfuscated codes

S Bardin, R David, JY Marion - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Software deobfuscation is a crucial activity in security analysis and especially in malware
analysis. While standard static and dynamic approaches suffer from well-known …

Towards static analysis of virtualization-obfuscated binaries

J Kinder - 2012 19th Working Conference on Reverse …, 2012 - ieeexplore.ieee.org
Virtualization-obfuscation protects a program from manual or automated analysis by
compiling it into byte code for a randomized virtual architecture and attaching a …

Static analysis of x86 executables

J Kinder - 2010 - infoscience.epfl.ch
This dissertation is concerned with static analysis of binary executables in a theoretically
well-founded, sound, yet practical way. The major challenge is the reconstruction of a correct …

{iHunter}: Hunting Privacy Violations at Scale in the Software Supply Chain on {iOS}

D Liu, Y **ao, C Zhang, K **e, X Bai, S Zhang… - 33rd USENIX Security …, 2024 - usenix.org
Privacy violations and compliance issues in mobile apps are serious concerns for users,
developers, and regulators. With many off-the-shelf tools on Android, prior works extensively …

Babelview: Evaluating the impact of code injection attacks in mobile webviews

C Rizzo, L Cavallaro, J Kinder - … in Attacks, Intrusions, and Defenses: 21st …, 2018 - Springer
A Webview embeds a fully-fledged browser in a mobile application and allows that
application to expose a custom interface to JavaScript code. This is a popular technique to …