You are in the accessibility menu

Please use this identifier to cite or link to this item: http://acervodigital.unesp.br/handle/11449/71657
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLakhotia, Arun-
dc.contributor.authorBoccardo, Davidson R.-
dc.contributor.authorSingh, Anshuman-
dc.contributor.authorManacero Jr., Aleardo-
dc.date.accessioned2014-05-27T11:24:40Z-
dc.date.accessioned2016-10-25T18:28:31Z-
dc.date.available2014-05-27T11:24:40Z-
dc.date.available2016-10-25T18:28:31Z-
dc.date.issued2010-04-20-
dc.identifierhttp://dx.doi.org/10.1145/1706356.1706381-
dc.identifier.citationProceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, p. 131-140.-
dc.identifier.urihttp://hdl.handle.net/11449/71657-
dc.identifier.urihttp://acervodigital.unesp.br/handle/11449/71657-
dc.description.abstractA method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ret instructions to achieve equivalent behavior. Since definition of context-sensitivity and algorithms for context-sensitive analysis have thus far been based on the specific semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in 'calling'-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control flow graph (ICFG), the same is not true of changes in 'stack'-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the context-sensitive version of the algorithm generates more precise results and is also computationally more efficient than its context-insensitive counterpart. Copyright © 2010 ACM.en
dc.format.extent131-140-
dc.language.isoeng-
dc.sourceScopus-
dc.subjectAnalysis of bianries-
dc.subjectContext-sensitive analysis-
dc.subjectDeobfuscation-
dc.subjectObfuscation-
dc.subjectAbstract interpretations-
dc.subjectContext sensitivity-
dc.subjectContext-sensitive-
dc.subjectControl flow graphs-
dc.subjectExecutables-
dc.subjectInter-procedural-
dc.subjectInter-procedural analysis-
dc.subjectProcedure call-
dc.subjectSpecific semantics-
dc.subjectMathematical operators-
dc.subjectProgram interpreters-
dc.subjectTechnical presentations-
dc.subjectJava programming language-
dc.titleContext-sensitive analysis of obfuscated x86 executablesen
dc.typeoutro-
dc.contributor.institutionUniversity of Louisiana-
dc.contributor.institutionUniversidade Estadual Paulista (UNESP)-
dc.description.affiliationCenter for Advanced Computer Studies University of Louisiana, Lafayette, LA-
dc.description.affiliationElectrical Engineering Dept. Paulista State University (UNESP)-
dc.description.affiliationUnespElectrical Engineering Dept. Paulista State University (UNESP)-
dc.identifier.doi10.1145/1706356.1706381-
dc.rights.accessRightsAcesso restrito-
dc.relation.ispartofProceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation-
dc.identifier.scopus2-s2.0-77950882873-
Appears in Collections:Artigos, TCCs, Teses e Dissertações da Unesp

There are no files associated with this item.
 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.