2008
DOI: 10.1007/978-3-540-89862-7_1
|View full text |Cite
|
Sign up to set email alerts
|

BitBlaze: A New Approach to Computer Security via Binary Analysis

Abstract: Abstract. In this paper, we give an overview of the BitBlaze project, a new approach to computer security via binary analysis. In particular, BitBlaze focuses on building a unified binary analysis platform and using it to provide novel solutions to a broad spectrum of different security problems. The binary analysis platform is designed to enable accurate analysis, provide an extensible architecture, and combines static and dynamic analysis as well as program verification techniques to satisfy the common needs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
308
0
10

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 539 publications
(318 citation statements)
references
References 17 publications
0
308
0
10
Order By: Relevance
“…For example, CodeSurfer [11] can perform program slicing to support a better understanding of the code behavior. BitBlaze [10] combines dynamic and static analysis components to extract information from malware. Other tools like Coverity [12], Path Finder [14] or CoreDet [13] rely either on C or Java language constructs and LLVM compilers [15] to transform the source code to their analysis format.…”
Section: Related Workmentioning
confidence: 99%
“…For example, CodeSurfer [11] can perform program slicing to support a better understanding of the code behavior. BitBlaze [10] combines dynamic and static analysis components to extract information from malware. Other tools like Coverity [12], Path Finder [14] or CoreDet [13] rely either on C or Java language constructs and LLVM compilers [15] to transform the source code to their analysis format.…”
Section: Related Workmentioning
confidence: 99%
“…To obtain a fully over-approximate CFG without additional preconditions, the missing two indirect branches could be covered using dynamic test generation [9,10,17]. Note that complete control flow reconstruction by dynamic test generation alone requires full branch coverage, therefore it would need to create at least 5 tests.…”
Section: Overviewmentioning
confidence: 99%
“…We recorded concrete execution traces on a single-processor 32-bit Windows XP guest system running in the BitBlaze [17] version of QEMU. As soon as the target process is started, all user-mode instructions (including libraries) are recorded to a file.…”
Section: Implementation and Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…BitBlaze [29] presents a novel fusion of static and dynamic taint analysis techniques to track implicit and explicit flow. DTA++ [20], based on the Bitblaze approach, presents an enhancement of dynamic taint analysis to limit the under-tainting problem.…”
Section: Related Workmentioning
confidence: 99%