Sciweavers

Share
CGO
2006
IEEE

BIRD: Binary Interpretation using Runtime Disassembly

12 years 5 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to automatically detect or eliminate such vulnerabilities. So far, most of them cannot be applied to commercially distributed applications on the Windows/x86 platform, because it is almost impossible to disassemble a binary file with 100% accuracy and coverage on that platform. This paper presents the design, implementation, and evaluation of a binary analysis and instrumentation infrastructure for the Windows/x86 platform called BIRD (Binary Interpretation using Runtime Disassembly), which provides two services to developers of security-enhancing program transformation tools: converting binary code into assembly language instructions for further analysis, and inserting instrumentation code at specific places of a given binary without affecting its execution semantics. Instead of requiring a highfidelity instru...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi
Added 10 Jun 2010
Updated 10 Jun 2010
Type Conference
Year 2006
Where CGO
Authors Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
Comments (0)
books