A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Obfuscation resilient binary code reuse through trace-oriented programming
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that binary code can be extracted and reused, they are often based on static analysis and face challenges when coping with obfuscated binaries. This paper introduces trace-oriented programming (TOP), a general framework for generating new software from existing binary code by elevating the low-level binary code to C
doi:10.1145/2508859.2516664
dblp:conf/ccs/ZengFMLZX13
fatcat:3qob5amrfbdhrnk4ugu4p77jdm