Input generation via decomposition and re-stitching: finding bugs in Malware

  title={Input generation via decomposition and re-stitching: finding bugs in Malware},
  author={J. Caballero and Pongsin Poosankam and Stephen McCamant and D. Babic and D. Song},
  booktitle={CCS '10},
  • J. Caballero, Pongsin Poosankam, +2 authors D. Song
  • Published in CCS '10 2010
  • Computer Science
  • Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before they are exploited. But there has been little research on the converse question of whether defenders can turn the tables by finding vulnerabilities in malware. We provide a first affirmative answer to that question. We introduce a new technique, stitched dynamic symbolic execution, that makes it possible to use… CONTINUE READING
    52 Citations

    Figures, Tables, and Topics from this paper.

    RevEngE is a dish served cold: Debug-Oriented Malware Decompilation and Reassembly
    Unleashing Mayhem on Binary Code
    • 352
    • PDF
    Exploiting Trade-off s in Symbolic Execution for Identifying Security Bugs
    • 6
    Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping
    • 38
    • PDF
    Fuzz Testing in Stack Based Buffer Overflow
    • 1
    • PDF