Reassembleable Disassembling

@inproceedings{Wang2015ReassembleableD,
  title={Reassembleable Disassembling},
  author={Shuai Wang and Pei Wang and Dinghao Wu},
  booktitle={USENIX Security Symposium},
  year={2015}
}
Reverse engineering has many important applications in computer security, one of which is retrofitting software for safety and security hardening when source code is not available. By surveying available commercial and academic reverse engineering tools, we surprisingly found that no existing tool is able to disassemble executable binaries into assembly code that can be correctly assembled back in a fully automated manner, even for simple programs. Actually in many cases, the resulted… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 44 CITATIONS

Ramblr: Making Reassembly Great Again

VIEW 9 EXCERPTS
CITES BACKGROUND, RESULTS & METHODS
HIGHLY INFLUENCED

Datalog Disassembly

VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

BinRec: Attack Surface Reduction Through Dynamic Binary Recovery

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications

  • ACSAC
  • 2017
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Semantics-Aware Machine Learning for Function Recognition in Binary Code

  • 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)
  • 2017
VIEW 14 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

UROBOROS: Instrumenting Stripped Binaries with Static Reassembling

  • 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)
  • 2016
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

REPICA: Rewriting Position Independent Code of ARM

VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 47 REFERENCES

Obfuscation resilient binary code reuse through trace-oriented programming

  • ACM Conference on Computer and Communications Security
  • 2013
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Link-time binary rewriting techniques for program compaction

  • ACM Trans. Program. Lang. Syst.
  • 2005
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Taint- Pipe: Pipelined symbolic taint analysis

J. MING, WU D., G. XIAO, J. WANG, LIU
  • In Proceedings of the 24th USENIX Security Symposium
  • 2015
VIEW 1 EXCERPT