Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.6.051

Design and Implementation of Framework for Static Execution Flow Trace of Binary Codes  

Baek, Yeong-Tae (Dept. of Multimedia, Kimpo College)
Kim, Ki-Tae (Naru Technology Co. Ltd.)
Jun, Sang-Pyo (School of General Educaton, Namseoul University)
Abstract
In domestic, the binary code analysis technology is insufficient. In general, an executable file that is installed on your computer without the source code into an executable binary files is given only the most dangerous, or because it is unknown if the action is to occur. In this paper, static program analysis at the binary level to perform the design and implementation framework. In this paper, we create a control flow graph. We use the graph of the function call and determine whether dangerous. Through Framework, analysis of binary files is easy.
Keywords
binary code; control flow analysis; framework;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Denis Gopan , Thomas Reps, Low-level library analysis and summarization, Proceedings of the 19th international conference on Computer aided verification, July 03-07, 2007, Berlin, Germany
2 M. D. Ernst. "Static and Dynamic Analysis: Synergy and Duality", In WODA 2003: ICSE Workshop on Dynamic Analysis, Portland, OR, May 9, 2003.
3 Byoungyoung Lee , Yuna Kim , Jong Kim, binOb+: a framework for potent and stealthy binary obfuscation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, April 13-16, 2010, Beijing, China
4 C. Kruegel , W. Robertson , F. Valeur , G. Vigna, "Static disassembly of obfuscated binaries", Proceedings of the 13th conference on USENIX Security Symposium, pp.18-18, 2004.
5 Gogul Balakrishnan , Thomas Reps, WYSINWYX: What you see is not what you eXecute, ACM Transactions on Programming Languages and Systems (TOPLAS), v.32 n.6, p.1-84, August 2010
6 E. Carrera et al, "Digital Genome Mapping : Advanced Binary Malware Analysis", Proceedings of 15th Virus Bulletin International Conference, pp.187-197, 2004.
7 IDA Pro. http://www.datarescue.com/
8 Yeong-Tae Baek, Ki-Tae Kim, "Framework for Static Control Flow Analysis of Binary Codes," Proc. of The Korea Society of Computer and Information, Vol. 18, No. 2, pp. 67-70, Jul. 2010.
9 M. Cova, V. Felmetsger, G. Banks, and G. Vigna. "Static Detection of Vulnerabilities in x86 Executables", In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2006.