A Stack Memory Abstraction and Symbolic Analysis Framework for Executables

@article{Anand2016ASM,
  title={A Stack Memory Abstraction and Symbolic Analysis Framework for Executables},
  author={Kapil Anand and Khaled Elwazeer and Aparna Kotha and Matthew Smithson and Rajeev Barua and Angelos D. Keromytis},
  journal={ACM Trans. Softw. Eng. Methodol.},
  year={2016},
  volume={25},
  pages={19:1-19:38}
}
This article makes three contributions regarding reverse-engineering of executables. First, techniques are presented for recovering a precise and correct stack-memory model in executables while addressing executable-specific challenges such as indirect control transfers. Next, the enhanced memory model is employed to define a novel symbolic analysis framework for executables that can perform the same types of program analyses as source-level tools. Third, a demand-driven framework is presented… CONTINUE READING