Results 1 to 10 of about 3,130 (112)

On representation used in the binary code reverse engineering

open access: yesТруды Института системного программирования РАН, 2018
The paper discusses the problem of representation of algorithms extracted from binary code in course of reverse engineering: both representations for automatic analysis and final representations for the user.
V. A. Padaryan
doaj   +1 more source

Автоматизация разработки моделей устройств и вычислительных машин для QEMU

open access: yesТруды Института системного программирования РАН, 2018
Разработка виртуальных устройств и машин для QEMU - трудоёмкий процесс. С целью поддержки разработчика, в данной работе был проведён анализ архитектуры QEMU и процесса разработки моделей отдельных устройств и виртуальных машин для QEMU.
V. Yu. Efimov   +4 more
doaj   +1 more source

Software defect severity estimation in presence of modern defense mechanisms

open access: yesТруды Института системного программирования РАН, 2018
This paper introduces a refined method for automated exploitability evaluation of found program bugs. During security development lifecycle a significant number of crashes is detected in programs.
A. N. Fedotov   +5 more
doaj   +1 more source

Automated generation of machine instruction decoders

open access: yesТруды Института системного программирования РАН, 2018
This paper proposes a method of automated generation of machine instruction decoders for various processor architectures, mainly microcontrollers. Only minimal, high-level input from user is required: a set of assembly instruction templates and a list of
N. Yu. Fokina, M. A. Solovev
doaj   +1 more source

Buffer overrun detection method in binary code

open access: yesТруды Института системного программирования РАН, 2018
Buffer overflows are one of the most common and dangerous software errors. Exploitation of such errors can lead to an arbitrary code execution and system disclosure. This paper considers a method for detecting memory violations.
V. V. Kaushan
doaj   +1 more source

Method for exploitability estimation of program bugs

open access: yesТруды Института системного программирования РАН, 2018
The method for exploitability estimation of program bugs is presented. Using this technique allows to prioritize software bugs that were found. Thus, it gives an opportunity for a developer to fix bugs, which are most security critical at first.
A. N. Fedotov
doaj   +1 more source

Memory violation detection method in binary code

open access: yesТруды Института системного программирования РАН, 2018
In this paper memory violation detection method is considered. This method applied to program binaries, without requiring debug information. It allows to find such memory violations as out-of-bound read or writing in some buffer.
V. V. Kaushan   +3 more
doaj   +1 more source

Methods and software tools for combined binary code analysis

open access: yesТруды Института системного программирования РАН, 2018
This paper presents methods and tools for binary code analysis that have been developed in ISP RAS and their applications in fields of algorithm and data format recovery.
V. A. Padaryan   +8 more
doaj   +1 more source

Automated exploit generation method for stack buffer overflow vulnerabilities

open access: yesТруды Института системного программирования РАН, 2018
In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs.
V. A. Padaryan   +2 more
doaj   +1 more source

Search method for format string vulnerabilities

open access: yesТруды Института системного программирования РАН, 2018
In this paper search method for format string vulnerabilities is presented. The method is based on dynamic analysis and symbolic execution. It is applied to program binaries, without requiring debug information. We present a tool implementing this method.
I. A. Vakhrushev   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy