• Publications
  • Influence
A Generic Approach to Automatic Deobfuscation of Executable Code
Malicious software are usually obfuscated to avoid detection and resist analysis. When new malware is encountered, such obfuscations have to be penetrated or removed ("deobfuscated") in order toExpand
  • 123
  • 17
  • PDF
PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture
This paper describes PLTO, a link-time instrumentation and optimization tool we have developed for the Intel IA-32 architecture. A number of characteristics of this architecture complicate the taskExpand
  • 107
  • 12
  • PDF
Symbolic Execution of Obfuscated Code
Symbolic and concolic execution nd important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often beExpand
  • 52
  • 6
  • PDF
Identifying and Understanding Self-Checksumming Defenses in Software
Software self-checksumming is widely used as an anti-tampering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknessesExpand
  • 19
  • 4
  • PDF
Bit-Level Taint Analysis
  • B. Yadegari, S. Debray
  • Computer Science
  • IEEE 14th International Working Conference on…
  • 28 September 2014
Taint analysis has a wide variety of applications in software analysis, making the precision of taint analysis an important consideration. Current taint analysis algorithms, including previous workExpand
  • 25
  • 2
  • PDF
Partial Inlining
Technical Summary 1 Motivation Subprogram inlining is an optimization that has been studied extensively in the By replacing a procedure call with a copy of the body of the called procedure, it ooersExpand
  • 10
  • 2
A preliminary finite-element analysis of a shallow landslide in the Alki area of Seattle, Washington
2001 This report is preliminary and has not been reviewed for conformity with U.S. Geological Survey editorial standards nor with the North American Stratigraphic Code. Any use of trade names in thisExpand
  • 4
  • 2
  • PDF
Compiler Techniques for Code Compression
In recent years there has been an increasing trend towards the incorporation of computers into a variety of devices where the amount of memory available is limited. This makes it desirable to try andExpand
  • 29
  • 1
  • PDF
Micro-specialization: dynamic code specialization of database management systems
Database management systems (DBMSes) form a cornerstone of modern IT infrastructure, and it is essential that they have excellent performance. Much of the work to date on optimizing DBMS performanceExpand
  • 15
  • 1
  • PDF
Effïcient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks
As emerging sensor networks are normally deployed in the field and thus vulnerable to many types of attacks, it is critical to implement cryptographic algorithms in sensor nodes to provide securityExpand
  • 15
  • 1
  • PDF