BISTRO: Binary Component Extraction and Embedding for Software Security Applications

@inproceedings{Deng2013BISTROBC,
  title={BISTRO: Binary Component Extraction and Embedding for Software Security Applications},
  author={Zhui Deng and Xiangyu Zhang and Dongyan Xu},
  booktitle={ESORICS},
  year={2013}
}
In software security and malware analysis, researchers often need to directly manipulate binary program – benign or malicious – without source code. A useful pair of binary manipulation primitives are binary functional component extraction and embedding, for extracting a functional component from a binary program and for embedding a functional component in a binary program, respec­ tively. Such primitives are applicable to a wide range of security scenarios such as legacy program hardening… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 10 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

and K

  • C. Luk, R. Cohn, +5 authors V. Reddi
  • Hazelwood, “Pin: building customized program…
  • 2005
Highly Influential
4 Excerpts

W32. stuxnet dossier,

  • N. Falliere, L. Murchu, E. Chien
  • White paper, Symantec Corp., Security Response,
  • 2011

and V

  • P. Porras, H. Saidi
  • Yegneswaran, “Conficker c analysis,” SRI…
  • 2009
1 Excerpt

Similar Papers

Loading similar papers…