2014
DOI: 10.1007/s11042-014-1922-5
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic binary analyzer for scanning vulnerabilities with taint analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…AFLNET [ 20 ] uses state-feedback and coverage-feedback to guide the mutation of seeds and treat the message sequences as the fuzzing input to enable deep interaction with protocol implementations. And the work in [ 21 ] focuses on data flow at runtime.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…AFLNET [ 20 ] uses state-feedback and coverage-feedback to guide the mutation of seeds and treat the message sequences as the fuzzing input to enable deep interaction with protocol implementations. And the work in [ 21 ] focuses on data flow at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…AFLNET [20] uses state-feedback and coverage-feedback to guide the mutation of seeds and treat the message sequences as the fuzzing input to enable deep interaction with protocol implementations. And the work in [21] focuses on data flow at runtime. On Usenix2015, Ruiter et al modeled for the first time a state machine of the TLS protocol implementations based on the active learning method.…”
Section: Fuzzingmentioning
confidence: 99%
“…Binary analysis. Binary analysis techniques have been applied for different platforms, using static [7,9,12,21], dynamic [6,8,37], hybrid [11,22,54] and machine-learning-based [32,39,68,71] approaches. A recent work [15] tackles the challenging task of analyzing binaries by combining declarative static analysis (using Datalog declarative logic-based programming language) with reverse-engineering techniques to perform x-refs analysis in native libraries using Radare2 [51].…”
Section: Related Workmentioning
confidence: 99%
“…The paper by Chung et al [3] presents a dynamic binary analyzer that can find unknown vulnerabilities and self-modifying code. They adopt taint analysis to find vulnerabilities that transpire during runtime.…”
mentioning
confidence: 99%