Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Type inference on executables
J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …
available, and the only thing that we can access is the program executable. A fundamental …
Analyzing memory accesses in x86 executables
G Balakrishnan, T Reps - International conference on compiler …, 2004 - Springer
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the
work is to recover intermediate representations that are similar to those that can be created …
work is to recover intermediate representations that are similar to those that can be created …
Wysinwyx: What you see is not what you execute
G Balakrishnan, T Reps - ACM Transactions on Programming …, 2010 - dl.acm.org
Over the last seven years, we have developed static-analysis methods to recover a good
approximation to the variables and dynamically allocated memory objects of a stripped …
approximation to the variables and dynamically allocated memory objects of a stripped …
TIE: Principled reverse engineering of types in binary programs
JH Lee, T Avgerinos, D Brumley - 2011 - kilthub.cmu.edu
A recurring problem in security is reverse engineering binary code to recover high-level
language data abstractions and types. High-level programming languages have data …
language data abstractions and types. High-level programming languages have data …
A comparison of code similarity analysers
C Ragkhitwetsagul, J Krinke, D Clark - Empirical Software Engineering, 2018 - Springer
Copying and pasting of source code is a common activity in software engineering. Often, the
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
Dynamic binary analysis and instrumentation
N Nethercote - 2004 - cl.cam.ac.uk
Dynamic binary analysis (DBA) tools such as profilers and checkers help programmers
create better software. Dynamic binary instrumentation (DBI) frameworks make it easy to …
create better software. Dynamic binary instrumentation (DBI) frameworks make it easy to …
Assessment and analysis of software security flaws in virtual machines
CJ Wysopal, MP Moynahan, JR Stevenson - US Patent 8,613,080, 2013 - Google Patents
Security analysis and vulnerability testing results are “pack aged” or “bound to” the actual
software it describes. By linking the results to the software itself, downstream users of the …
software it describes. By linking the results to the software itself, downstream users of the …
NTFuzz: Enabling type-aware kernel fuzzing on windows with static binary analysis
Although it is common practice for kernel fuzzers to leverage type information of system
calls, current Windows kernel fuzzers do not follow the practice as most system calls are …
calls, current Windows kernel fuzzers do not follow the practice as most system calls are …
Finding the dwarf: recovering precise types from WebAssembly binaries
The increasing popularity of WebAssembly creates a demand for understanding and reverse
engineering WebAssembly binaries. Recovering high-level function types is an important …
engineering WebAssembly binaries. Recovering high-level function types is an important …
Codesurfer/x86—a platform for analyzing x86 executables
G Balakrishnan, R Gruian, T Reps… - … conference on compiler …, 2005 - Springer
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis
algorithm called value-set analysis (VSA) to recover intermediate representations that are …
algorithm called value-set analysis (VSA) to recover intermediate representations that are …