Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,535 papers from all fields of science
Search
Sign In
Create Free Account
Binary recompiler
Known as:
Static binary rewriting
, Dynamic binary rewriting
, Binary rewriting
Expand
A binary recompiler is a computer program that takes executable binary files as input, analyzes their structure, applies transformations and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Binary file
Binary translation
Compiler
Decompiler
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices
Xuewen Zhang
,
Yuanyuan Zhang
,
Juanru Li
,
Yikun Hu
,
Huayi Li
,
Dawu Gu
IEEE International Conference on Software…
2017
Corpus ID: 39747835
The rapid-iteration, web-style update cycle of Android helps fix revealed security vulnerabilities for its latest version…
Expand
2015
2015
Synthesis of machine code from semantics
Venkatesh Srinivasan
,
T. Reps
ACM-SIGPLAN Symposium on Programming Language…
2015
Corpus ID: 7216660
In this paper, we present a technique to synthesize machine-code instructions from a semantic specification, given as a…
Expand
Highly Cited
2014
Highly Cited
2014
BYTEWEIGHT: Learning to Recognize Functions in Binary Code
Tiffany Bao
,
Jonathan Burket
,
Maverick Woo
,
R. Turner
,
David Brumley
USENIX Security Symposium
2014
Corpus ID: 17022472
Function identification is a fundamental challenge in reverse engineering and binary program analysis. For instance, binary…
Expand
Highly Cited
2014
Highly Cited
2014
Brahmastra: Driving Apps to Test the Security of Third-Party Components
Ravi Bhoraskar
,
Seungyeop Han
,
+6 authors
D. Wetherall
USENIX Security Symposium
2014
Corpus ID: 15277900
We present an app automation tool called Brahmastra for helping app stores and security researchers to test third-party…
Expand
2013
2013
On-chip control flow integrity check for real time embedded systems
Fardin Abdi Taghi Abad
,
Joel van der Woude
,
+5 authors
Sibin Mohan
International Conference on Cyber-Physical…
2013
Corpus ID: 8517053
Modern industrial plants, vehicles and other cyber-physical systems are increasingly being built as an aggregation of embedded…
Expand
Highly Cited
2012
Highly Cited
2012
Securing untrusted code via compiler-agnostic binary rewriting
R. Wartell
,
V. Mohan
,
Kevin W. Hamlen
,
Zhiqiang Lin
Asia-Pacific Computer Systems Architecture…
2012
Corpus ID: 13310823
Binary code from untrusted sources remains one of the primary vehicles for malicious software attacks. This paper presents Reins…
Expand
2011
2011
A hybrid hardware--software technique to improve reliability in embedded processors
R. Ragel
,
S. Parameswaran
TECS
2011
Corpus ID: 16432451
Numerous methods have been described in research literature with methods to improve reliability of processors by the use of…
Expand
2008
2008
Flashproxy: transparently enabling rich web content via remote execution
Alexander Moshchuk
,
S. Gribble
,
H. Levy
ACM SIGMOBILE International Conference on Mobile…
2008
Corpus ID: 15980416
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich…
Expand
Highly Cited
2006
Highly Cited
2006
System Call Monitoring Using Authenticated System Calls
M. Rajagopalan
,
M. Hiltunen
,
T. Jim
,
R. Schlichting
IEEE Transactions on Dependable and Secure…
2006
Corpus ID: 11026884
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each…
Expand
2000
2000
Optimizing Code Size through Procedural Abstraction
J. Runeson
,
S. Nyström
,
J. Sjödin
ACM SIGPLAN Conference on Languages, Compilers…
2000
Corpus ID: 41898919
Memory size is an important economic factor in the development of embedded systems. It is therefore desirable to find compiler…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE