소프트웨어 보안과 바이너리 분석

  • Published : 2018.03.15

Abstract

Keywords

References

  1. Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen, S. Feng, C. Hauser, C. Kruegel, and G. Vigna, "(State of) the art of war: Offensive techniques in binary analysis," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 138-157, 2016.
  2. K. Thompson, "Reflections on trusting trust," Communications of the ACM, vol. 27, pp. 761-763, Aug. 1984. https://doi.org/10.1145/358198.358210
  3. S. Kim, M. Faerevaag, M. Jung, S. Jung, D. Oh, J. Lee, and S. K. Cha, "Testing intermediate representations for binary analysis," in Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 353-364, 2017.
  4. D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, "BAP: A binary analysis platform," in Proceedings of the International Conference on Computer Aided Verification, pp. 463-469, 2011.
  5. A. Di Federico, M. Payer, and G. Agosta, "Rev.ng: A unified binary analysis framework to recover cfgs and function boundaries," pp. 131-141, 2017.
  6. T. Dullien and S. Porst, "REIL: A platform-independent intermediate representation of disassembled code for static code analysis," 2009.
  7. S. Bardin, P. Herrmann, J. Leroux, O. Ly, R. Tabary, and A. Vincent, "The BINCOA framework for binary code analysis," in Proceedings of the International Conference on Computer Aided Verification, pp. 165-170, 2011.
  8. A. Djoudi and S. Bardin, "BINSEC: Binary code analysis with low-level regions," in Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 212- 217, 2015.
  9. D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena, "BitBlaze: A new approach to computer security via binary analysis," in Proceedings of the International Conference on Information Systems Security, pp. 1-25, 2008.
  10. M. V. Emmerik and T. Waddington, "Using a decompiler for real-world source recovery," in Proceedings of the Working Conference on Reverse Engineering, pp. 27-36, 2004.
  11. E. Fleury, O. Ly, G. Point, and A. Vincent, "Insight: An open binary analysis framework," in Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 218-224, 2015.
  12. J. Kinder and H. Veith, "Jakstab: A static analysis platform for binaries," in Proceedings of the International Conference on Computer Aided Verification, pp. 423-427, 2008.
  13. "Radare2." https://github.com/radare/radare2.
  14. D. Quinlan, G. Barany, and T. Panas, "Shared and distributed memory parallel security analysis of largescale source code and binary applications," tech. rep., Lawrence Livermore National Laboratory (LLNL), 2007.
  15. N. Nethercote and J. Seward, "Valgrind: a framework for heavyweight dynamic binary instrumentation," in Proceedings of the ACM Conference on Programming Language Design and Implementation, pp. 89-100, 2007.