Information Technology Reference
In-Depth Information
Acknowledgments. We would like to thank James Just for his guidance throughout
this project, Xing Li for implementing the IDA debug breakpoint based tracer, and Loc
Nguyen for implementing the taint graph visualization. We would like to thank Ilfak
Guilfanov and the IDA team for promptly fixing the bugs that we have reported to
them and for their suggestions on the GUI integration. We would like to thank Thomas
Dullien and Tim Kornau of the Google Zynamics team for making their latest version
of REIL available to us. The second author is supported in part by the NSF grant CCF-
1149454 and the ONR grant N00014-13-1-0527.
References
1. Godefroid, P., Levin, M.Y., Molnar, D.A.: Automated whitebox fuzz testing. In: Network and
Distributed System Security Symposium (2008)
2. Clause, J.A., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: ISSTA,
pp. 196-206 (2007)
3. Costa, M., Crowcroft, J., Castro, M., Rowstron, A.I.T., Zhou, L., Zhang, L., Barham, P.: Vigi-
lante: End-to-end containment of internet worm epidemics. ACM Trans. Comput. Syst. 26(4)
(2008)
4. Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and sig-
nature generation of exploits on commodity software. In: NDSS (2005)
5. Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zero-day at-
tacks for advertised honeypots with automatic signature generation. In: EuroSys, pp. 15-27
(2006)
6. Song, D., et al.: BitBlaze: A new approach to computer security via binary analysis. In: Sekar,
R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1-25. Springer, Heidelberg (2008)
7. Paxson, V.: et al.: A survey of support for implementing debuggers (1990),
ftp.ee.lbl.gov:papers/debugger-support.ps.Z
8. Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J.,
Hazelwood, K.: PIN: Building customized program analysis tools with dynamic instrumen-
tation. In: PLDI, pp. 190-200 (2005)
9. Nethercote, N., Seward, J.: Valgrind: A program supervision framework. Electr. Notes Theor.
Comput. Sci. 89(2) (2003)
10. Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical
Conference, FREENIX Track, 41-46 (2005)
11. Bhansali, S., Chen, W.K., De Jong, S., Edwards, A., Murray, R., Drinic, M., Mihocka, D.,
Chau, J.: Framework for instruction-level tracing and analysis of program executions. In:
International Conference on Virtual Execution Environments, pp. 154-163. ACM (2006)
12. GNU GDB: Process Record & Replay,
http://sourceware.org/gdb/wiki/ProcessRecord
13. Eagle, C.: The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassem-
bler, San Francisco, CA, USA (2008)
14. Chipounov, V., Kuznetsov, V., Candea, G.: The S2E platform: Design, implementation, and
applications. ACM Trans. Comput. Syst. 30(1), 2 (2012)
15. Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views
for dynamic android malware analysis. In: USENIX Security, p. 29 (2012)
16. Dullien, T., Porst, S.: REIL: A platform-independent intermediate representation of disas-
sembled code for static code analysis. In: CanSecWest (2009)
17. REIL, http://www.zynamics.com/binnavi/manual/html/reil
language.htm
Search WWH ::




Custom Search