Results 1 to 10 of about 3,130 (112)
On representation used in the binary code reverse engineering
The paper discusses the problem of representation of algorithms extracted from binary code in course of reverse engineering: both representations for automatic analysis and final representations for the user.
V. A. Padaryan
doaj +1 more source
Автоматизация разработки моделей устройств и вычислительных машин для QEMU
Разработка виртуальных устройств и машин для QEMU - трудоёмкий процесс. С целью поддержки разработчика, в данной работе был проведён анализ архитектуры QEMU и процесса разработки моделей отдельных устройств и виртуальных машин для QEMU.
V. Yu. Efimov +4 more
doaj +1 more source
Software defect severity estimation in presence of modern defense mechanisms
This paper introduces a refined method for automated exploitability evaluation of found program bugs. During security development lifecycle a significant number of crashes is detected in programs.
A. N. Fedotov +5 more
doaj +1 more source
Automated generation of machine instruction decoders
This paper proposes a method of automated generation of machine instruction decoders for various processor architectures, mainly microcontrollers. Only minimal, high-level input from user is required: a set of assembly instruction templates and a list of
N. Yu. Fokina, M. A. Solovev
doaj +1 more source
Buffer overrun detection method in binary code
Buffer overflows are one of the most common and dangerous software errors. Exploitation of such errors can lead to an arbitrary code execution and system disclosure. This paper considers a method for detecting memory violations.
V. V. Kaushan
doaj +1 more source
Method for exploitability estimation of program bugs
The method for exploitability estimation of program bugs is presented. Using this technique allows to prioritize software bugs that were found. Thus, it gives an opportunity for a developer to fix bugs, which are most security critical at first.
A. N. Fedotov
doaj +1 more source
Memory violation detection method in binary code
In this paper memory violation detection method is considered. This method applied to program binaries, without requiring debug information. It allows to find such memory violations as out-of-bound read or writing in some buffer.
V. V. Kaushan +3 more
doaj +1 more source
Methods and software tools for combined binary code analysis
This paper presents methods and tools for binary code analysis that have been developed in ISP RAS and their applications in fields of algorithm and data format recovery.
V. A. Padaryan +8 more
doaj +1 more source
Automated exploit generation method for stack buffer overflow vulnerabilities
In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs.
V. A. Padaryan +2 more
doaj +1 more source
Search method for format string vulnerabilities
In this paper search method for format string vulnerabilities is presented. The method is based on dynamic analysis and symbolic execution. It is applied to program binaries, without requiring debug information. We present a tool implementing this method.
I. A. Vakhrushev +3 more
doaj +1 more source

