Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- tutorialJanuary 2014
The GDSL toolkit: Generating Frontends for the Analysis of Machine Code
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 7, pp 1–6https://doi.org/10.1145/2556464.2559596Any inspection, analysis or reverse engineering of binaries requires a translation of the program text into an intermediate representation (IR) that conveys the semantics of the program. To this end, we propose a domain specific language called GDSL (...
- tutorialJanuary 2014
Analyzing program dependencies for malware detection
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 6, pp 1–7https://doi.org/10.1145/2556464.2556470Metamorphic malware continuously modify their code, while preserving their functionality, in order to foil misuse detection. The key for defeating metamorphism relies in a semantic characterization of the embedding of the malware into the target ...
- tutorialJanuary 2014
Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 5, pp 1–11https://doi.org/10.1145/2556464.2556469Software programs are prone to reverse-engineering. Protection usually consists either in obfuscation or Randomized Instruction Set Emulation (RISE). In this article, we explore a mixed software/hardware RISE suitable for embedded systems. This solution ...
- tutorialJanuary 2014
DroidLegacy: Automated Familial Classification of Android Malware
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 3, pp 1–12https://doi.org/10.1145/2556464.2556467We present an automated method for extracting familial signatures for Android malware, i.e., signatures that identify malware produced by piggybacking potentially different benign applications with the same (or similar) malicious code. The APK classes ...
- tutorialJanuary 2014
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 2, pp 1–10https://doi.org/10.1145/2556464.2556466In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al. as future work, ...
-
- tutorialJanuary 2014
Recovering C++ Objects From Binaries Using Inter-Procedural Data-Flow Analysis
- Wesley Jin,
- Cory Cohen,
- Jeffrey Gennari,
- Charles Hines,
- Sagar Chaki,
- Arie Gurfinkel,
- Jeffrey Havrilla,
- Priya Narasimhan
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 1, pp 1–11https://doi.org/10.1145/2556464.2556465Object-oriented programming complicates the already difficult task of reverse engineering software, and is being used increasingly by malware authors. Unlike traditional procedural-style code, reverse engineers must understand the complex interactions ...