咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 8 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 13 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 电气工程
    • 3 篇 信息与通信工程

主题

  • 19 篇 dynamic binary a...
  • 4 篇 valgrind
  • 4 篇 dynamic binary i...
  • 3 篇 memcheck
  • 3 篇 protocol reverse...
  • 2 篇 experimentation
  • 2 篇 performance
  • 2 篇 design
  • 2 篇 data dependence ...
  • 2 篇 dynamic taint an...
  • 2 篇 shadow values
  • 1 篇 intel pin
  • 1 篇 selective instru...
  • 1 篇 operating system...
  • 1 篇 concurrent compu...
  • 1 篇 custom memory al...
  • 1 篇 pkg trust gatewa...
  • 1 篇 computer archite...
  • 1 篇 program security
  • 1 篇 virtual machine ...

机构

  • 3 篇 natl ict austral...
  • 3 篇 openworks llp ca...
  • 2 篇 vrije univ amste...
  • 2 篇 vrije univ amste...
  • 1 篇 zhengzhou inform...
  • 1 篇 vrije univ amste...
  • 1 篇 shanghai jiao to...
  • 1 篇 ibm res new delh...
  • 1 篇 aswan univ dept ...
  • 1 篇 chinese acad sci...
  • 1 篇 novsu veliky nov...
  • 1 篇 alexandria univ ...
  • 1 篇 tech univ cluj n...
  • 1 篇 univ chinese aca...
  • 1 篇 egypt japan univ...
  • 1 篇 anhui univ sch c...
  • 1 篇 nudt compute col...
  • 1 篇 syracuse univ de...
  • 1 篇 univ belgrade sc...
  • 1 篇 rt rk inst comp ...

作者

  • 3 篇 seward julian
  • 3 篇 nethercote nicho...
  • 2 篇 wang yongjun
  • 2 篇 xie peidai
  • 2 篇 li meijian
  • 2 篇 abbas mostafa
  • 2 篇 slowinska asia
  • 2 篇 bos herbert
  • 1 篇 khanna dhriti
  • 1 篇 yan lok kwong
  • 1 篇 misic marko
  • 1 篇 dhawan mohan
  • 1 篇 jia shijie
  • 1 篇 sharma subodh
  • 1 篇 kimura keiji
  • 1 篇 hu xunchao
  • 1 篇 vlahovic tamara
  • 1 篇 shu hui
  • 1 篇 udayan prabir si...
  • 1 篇 rohou erven

语言

  • 18 篇 英文
  • 1 篇 其他
检索条件"主题词=dynamic binary analysis"
19 条 记 录,以下是1-10 订阅
排序:
DECAF: A Platform-Neutral Whole-System dynamic binary analysis Platform
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2017年 第2期43卷 164-184页
作者: Henderson, Andrew Yan, Lok Kwong Hu, Xunchao Prakash, Aravind Yin, Heng McCamant, Stephen Syracuse Univ Dept Elect Engn & Comp Sci Syracuse NY 13244 USA Rome Lab Dept RIG Rome NY 13441 USA Univ Minnesota Twin Cities Dept Comp Sci & Engn Minneapolis MN 55455 USA
dynamic binary analysis is a prevalent and indispensable technique in program analysis. While several dynamic binary analysis tools and frameworks have been proposed, all suffer from one or more of: prohibitive perfor... 详细信息
来源: 评论
On the detection of custom memory allocators in C binaries
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2016年 第3期21卷 753-777页
作者: Chen, Xi Slowinska, Asia Bos, Herbert Vrije Univ Amsterdam Network & Syst Secur Grp Amsterdam Netherlands Vrije Univ Amsterdam Syst & Network Secur Grp Amsterdam Netherlands Vrije Univ Amsterdam Syst & Network Secur Amsterdam Netherlands
Many reverse engineering techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system's malloc and free functions, and track each chunk of memory thus... 详细信息
来源: 评论
Accelerating Data Dependence Profiling Through Abstract Interpretation of Loop Instructions
收藏 引用
IEEE ACCESS 2022年 10卷 31626-31640页
作者: Abbas, Mostafa Soliman, Mostafa, I Rabia, Sherif, I Kimura, Keiji El-Mahdy, Ahmed Egypt Japan Univ Sci & Technol Dept Comp Sci & Engn New Borg El Arab City 21934 Egypt Aswan Univ Dept Elect Engn Aswan 81528 Egypt Alexandria Univ Dept Comp & Syst Engn Alexandria 21544 Egypt Waseda Univ Dept Comp Sci & Engn Tokyo 1698555 Japan
Data dependence analysis is a must-do operation for parallelisation since it reveals the safe parallelisable regions of serial codes. Generally, it relies on dynamic analysis, which incurs substantial execution time a... 详细信息
来源: 评论
Implementation of an effective dynamic concolic execution framework for analyzing binary programs
收藏 引用
COMPUTERS & SECURITY 2019年 86卷 1-27页
作者: Zhu, Erzhou Wen, Peng Ni, Kanqi Ma, Ruhui Anhui Univ Sch Comp Sci & Technol Hefei 230601 Anhui Peoples R China Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China
With the increasing availability of the computational power and constraint solving technology, the symbolic execution technology has regained interest in recent years. However, it still suffers from state explosion an... 详细信息
来源: 评论
Scalable data structure detection and classification for C/C plus plus binaries
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2016年 第3期21卷 778-810页
作者: Haller, Istvan Slowinska, Asia Bos, Herbert Vrije Univ Amsterdam Syst & Network Secur Grp Amsterdam Netherlands Vrije Univ Amsterdam Syst & Network Secur Amsterdam Netherlands
Many existing techniques for reversing data structures in C/C++ binaries are limited to low-level programming constructs, such as individual variables or structs. Unfortunately, without detailed information about a pr... 详细信息
来源: 评论
Reverse extraction of protocol model from network applications
收藏 引用
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY 2013年 第4期7卷 228-245页
作者: Li, Meijian Wang, Yongjun Jin, Shangjie Xie, Peidai Natl Univ Def Technol Comp Coll Changsha 410073 Hunan Peoples R China Acad Mil Transportat Inst Mil Transportat Tianjin 300161 Peoples R China
The reverse extraction of the protocol model from a network application is performed to understand network behaviour and detect vulnerabilities. In this paper, we propose a framework that automatically extracts the de... 详细信息
来源: 评论
Extending Valgrind framework with the MIPS MSA support
Extending Valgrind framework with the MIPS MSA support
收藏 引用
Zooming Innovation in Consumer Electronics International Conference (ZINC)
作者: Vlahovic, Tamara Misic, Marko Tomasevic, Milo Karadzic, Aleksandra Rikalo, Aleksandar Univ Belgrade Sch Elect Engn Belgrade Serbia RT RK Inst Comp Based Syst Novi Sad Serbia
This paper presents an extension of Valgrind framework for dynamic binary code analysis to support MIPS MSA instruction set which includes instructions for vector (SIMD) processing of integer and floating-point data o... 详细信息
来源: 评论
TLTracer: dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer  59
TLTracer: Dynamically Detecting Cache Side Channel Attacks w...
收藏 引用
59th Annual IEEE International Conference on Communications (IEEE ICC)
作者: Wang, Mingyu Meng, Lingjia Zheng, Fangyu Lin, Jingqiang Jia, Shijie Ma, Yuan Fan, Haoling Chinese Acad Sci Inst Informat Engn Key Lab Cyberspace Secur Def Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Univ Chinese Acad Sci Sch Cryptol Beijing Peoples R China Univ Sci & Technol China Sch Cyber Secur Hefei Peoples R China
Recently, cache side-channel attacks have gained increasing attention due to the significant threat they pose to data security. As research advances, these attacks have become more covert and their impact has been wid... 详细信息
来源: 评论
Approximate Data Dependence Profiling Based on Abstract Interval and Congruent Domains  33rd
Approximate Data Dependence Profiling Based on Abstract Inte...
收藏 引用
33rd International Conference on Architecture of Computing Systems (ARCS)
作者: Abbas, Mostafa Omar, Rasha El-Mandy, Ahmed Rohou, Erven Egypt Japan Univ Sci & Technol E JUST Alexandria Egypt Univ Rennes INRIA CNRS IRISA Rennes France Alexandria Univ Alexandria Egypt
Although parallel processing is mainstream, existing programs are often serial, and usually re-engineering cost is high. Data dependence profiling allows for automatically assessing parallelisation potential;Yet, data... 详细信息
来源: 评论
POLLUX : Safely Upgrading Dependent Application Libraries  24
POLLUX : Safely Upgrading Dependent Application Libraries
收藏 引用
24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE)
作者: Kalra, Sukrit Goel, Ayush Khanna, Dhriti Dhawan, Mohan Sharma, Subodh Purandare, Rahul IIIT Delhi Delhi India IBM Res New Delhi Delhi India IIT Delhi New Delhi Delhi India
Software evolution in third-party libraries across version upgrades can result in addition of new functionalities or change in existing APIs. As a result, there is a real danger of impairment of backward compatibility... 详细信息
来源: 评论