Sciweavers

30 search results - page 2 / 6
» String analysis for x86 binaries
Sort
View
OSDI
2006
ACM
14 years 7 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
CCS
2010
ACM
13 years 5 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
ICANNGA
2009
Springer
134views Algorithms» more  ICANNGA 2009»
14 years 1 months ago
A Generative Model for Self/Non-self Discrimination in Strings
A statistical generative model is presented as an alternative to negative selection in anomaly detection of string data. We extend the probabilistic approach to binary classificat...
Matti Pöllä
DSN
2009
IEEE
14 years 2 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea