References
- Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen, S. Feng, C. Hauser, C. Kruegel, and G. Vigna, "(State of) the art of war: Offensive techniques in binary analysis," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 138-157, 2016.
- K. Thompson, "Reflections on trusting trust," Communications of the ACM, vol. 27, pp. 761-763, Aug. 1984. https://doi.org/10.1145/358198.358210
- S. Kim, M. Faerevaag, M. Jung, S. Jung, D. Oh, J. Lee, and S. K. Cha, "Testing intermediate representations for binary analysis," in Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 353-364, 2017.
- D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, "BAP: A binary analysis platform," in Proceedings of the International Conference on Computer Aided Verification, pp. 463-469, 2011.
- A. Di Federico, M. Payer, and G. Agosta, "Rev.ng: A unified binary analysis framework to recover cfgs and function boundaries," pp. 131-141, 2017.
- T. Dullien and S. Porst, "REIL: A platform-independent intermediate representation of disassembled code for static code analysis," 2009.
- S. Bardin, P. Herrmann, J. Leroux, O. Ly, R. Tabary, and A. Vincent, "The BINCOA framework for binary code analysis," in Proceedings of the International Conference on Computer Aided Verification, pp. 165-170, 2011.
- A. Djoudi and S. Bardin, "BINSEC: Binary code analysis with low-level regions," in Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 212- 217, 2015.
- D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena, "BitBlaze: A new approach to computer security via binary analysis," in Proceedings of the International Conference on Information Systems Security, pp. 1-25, 2008.
- M. V. Emmerik and T. Waddington, "Using a decompiler for real-world source recovery," in Proceedings of the Working Conference on Reverse Engineering, pp. 27-36, 2004.
- E. Fleury, O. Ly, G. Point, and A. Vincent, "Insight: An open binary analysis framework," in Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 218-224, 2015.
- J. Kinder and H. Veith, "Jakstab: A static analysis platform for binaries," in Proceedings of the International Conference on Computer Aided Verification, pp. 423-427, 2008.
- "Radare2." https://github.com/radare/radare2.
- D. Quinlan, G. Barany, and T. Panas, "Shared and distributed memory parallel security analysis of largescale source code and binary applications," tech. rep., Lawrence Livermore National Laboratory (LLNL), 2007.
- N. Nethercote and J. Seward, "Valgrind: a framework for heavyweight dynamic binary instrumentation," in Proceedings of the ACM Conference on Programming Language Design and Implementation, pp. 89-100, 2007.