首页> 外文会议>IEEE International Conference on Software Maintenance >An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables
【24h】

An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables

机译:可执行文件的准确堆栈内存抽象和符号分析框架

获取原文

摘要

This paper makes two contributions regarding reverse engineering of executables. First, techniques are presented for recovering a precise and correct stack memory model in executables in presence of executable-specific artifacts such as indirect control transfers. Next, the enhanced memory model is employed to define a novel symbolic analysis framework for executables that can perform the same types of program analysis as source-level tools. Frameworks hitherto fail to simultaneously maintain the properties of correct representation and precise memory model and ignore memory-allocated variables while defining symbolic analysis mechanisms. Our methods do not use symbolic, relocation, or debug information, which are usually absent in deployed binaries. We describe our framework, highlighting the novel intellectual contributions of our approach, and demonstrate its efficacy and robustness by applying it to various traditional analyses, including identifying information flow vulnerabilities in five real-world programs.
机译:本文对可执行文件逆向工程进行了两项贡献。首先,介绍在可执行文件中在可执行的特定工件(例如间接控制传输)的情况下在可执行文件中恢复精确和正确的堆叠存储器模型。接下来,使用增强的存储器模型来为可执行文件定义可以执行与源级别工具相同类型的程序分析的可执行文件的新颖符号分析框架。迄今为止无法同时保持正确表示和精确存储器模型的属性,并在定义符号分析机制时忽略内存分配的变量。我们的方法不使用符号,重定位或调试信息,这些信息通常不存在于部署的二进制文件中。我们描述了我们的框架,突出了我们的方法的新颖智力贡献,并通过将其应用于各种传统分析,包括识别五个现实世界计划中的信息流漏洞的效力和稳健性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号