Input generation via decomposition and re-stitching: finding bugs in Malware

  title={Input generation via decomposition and re-stitching: finding bugs in Malware},
  author={J. Caballero and Pongsin Poosankam and Stephen McCamant and D. Babic and D. Song},
  booktitle={CCS '10},
  • J. Caballero, Pongsin Poosankam, +2 authors D. Song
  • Published in CCS '10 2010
  • Computer Science
  • Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before they are exploited. But there has been little research on the converse question of whether defenders can turn the tables by finding vulnerabilities in malware. We provide a first affirmative answer to that question. We introduce a new technique, stitched dynamic symbolic execution, that makes it possible to use… CONTINUE READING

    Figures, Tables, and Topics from this paper.

    Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping
    • 36
    • PDF
    Automated Identification of Cryptographic Primitives in Binary Programs
    • 72
    • PDF
    Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution
    • 31
    • Highly Influenced
    • PDF