Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.3.615

Reverse engineering of data abstractions on fragmented binary code  

Lee, Jong-Hyup (Korea National University of Transportation)
Abstract
Reverse engineering via static analysis is an essential step in software security and it focuses on reconstructing code structures and data abstractions. In particular, reverse engineering of data abstractions is critical to understand software but the previous scheme, VSA, is not suitable for applying to fragmented binaries. This paper proposes an enhanced method through dynamic region assignment.
Keywords
Software security; Reverse Engineering;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Flemming Nielson, Hanne R. Nielson, and Chris Hankin. Principles of Program Analysis. Springer, Dec. 2004.
2 G. Balakrishnan and T. Reps, "Analyzing memory access in x86 executables," Proceedings of International Conference on Compiler Construction (CC), pp. 5-23, Apr. 2004.
3 J. Lee, T. Avgerinos, and D. Brumley, "TIE: Principled Reverse Engineering of Types in Binary Programs," Proceedings of Network and Distributed System Security (NDSS), Feb. 2011.
4 D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, "BAP: A Binary Analysis Platform," Proceedings of Computer Aided Verification (CAV), pp 463-469, Jul. 2011.
5 A. Aho, M. Lam, R. Sethi, and J. Ullman, Compilers: Principles, Techniques, and Tools, Pearson Education Inc, Sep. 2006.
6 김민성, 정덕영, "클라이언트 애플리케이션에서의 해킹," 한국정보보호학회논문지, 18(3), pp. 48-52, 2008년 6월.