Proceedings International Conference on Software Maintenance
DOI: 10.1109/icsm.1997.624245
|View full text |Cite
|
Sign up to set email alerts
|

Intraprocedural static slicing of binary executables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(54 citation statements)
references
References 20 publications
0
54
0
Order By: Relevance
“…The static analysis technical analysis method does not perform binaries, such as disassembly, source code analysis, binary statistical analysis, decompile, belong to the reverse analysis methods [1,2] . Determined by static analysis of malicious code after its general structure, the feature string, feature code section [3] .…”
Section: ) Static Analysis Techniquesmentioning
confidence: 99%
“…The static analysis technical analysis method does not perform binaries, such as disassembly, source code analysis, binary statistical analysis, decompile, belong to the reverse analysis methods [1,2] . Determined by static analysis of malicious code after its general structure, the feature string, feature code section [3] .…”
Section: ) Static Analysis Techniquesmentioning
confidence: 99%
“…We focus on program slicing, because it has many applications, including re-engineering [11], maintenance [19], [21], debugging [32], [49], testing [8], [23], refactoring [17], reuse [4], [12], and comprehension [15], [30], [43]. Static slicing also illustrates many issues that affect attempts to construct a 'safe' static analysis.…”
Section: Introductionmentioning
confidence: 99%
“…This is crucial for analyzing executables because numeric values and addresses are indistinguishable at runtime. Moreover, unlike earlier algorithms that analyze executables [8,11], VSA takes into account data manipulations involving memory locations also. To track the contents of memory locations, the initial run of VSA uses the variables recovered via the Semi-Naïve approach from §3.1.…”
Section: Value-set Analysis (Vsa)mentioning
confidence: 99%
“…His implementation does not support analysis of programs that use heap-allocated storage. Moreover, his techniques are not able to infer from loop access patterns-as ASI can-that an unstructured cell (e.g., unsigned char z[32] has internal array substructures, (e.g., int y [8]; or struct {int a [3]; int b;} x [2];).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation