Analyzing Memory Accesses in x86 Binary Executables
| dc.contributor.author | Balakrishnan, Gogul | en_US |
| dc.contributor.author | Reps, Thomas | en_US |
| dc.date.accessioned | 2012-03-15T17:17:28Z | |
| dc.date.available | 2012-03-15T17:17:28Z | |
| dc.date.created | 2003 | en_US |
| dc.date.issued | 2003 | |
| dc.description.abstract | This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be created for a program written in a high-level language. Our goal is to perform this task for programs such as plugins, mobile code, worms, and virus-infected code. For such programs, symbol-table and debugging information is either entirely absent, or cannot be relied upon if present; hence, the technique described in the paper makes no use of symbol-table/debugging information. Instead, an analysis is carried out to recover information about the contents of memory locations and how they are manipulated. The analysis, called value-set analysis, tracks address-valued and integer-valued quantities simultaneously. | en_US |
| dc.format.mimetype | application/pdf | en_US |
| dc.identifier.citation | TR1486 | en_US |
| dc.identifier.uri | http://digital.library.wisc.edu/1793/60364 | |
| dc.publisher | University of Wisconsin-Madison Department of Computer Sciences | en_US |
| dc.title | Analyzing Memory Accesses in x86 Binary Executables | en_US |
| dc.type | Technical Report | en_US |
Files
Original bundle
1 - 1 of 1