Authors
Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer
Publication date
2020/5/18
Conference
2020 IEEE Symposium on Security and Privacy (SP)
Pages
1497-1511
Publisher
IEEE
Description
Analyzing the security of closed source binaries is currently impractical for end-users, or even developers who rely on third-party libraries. Such analysis relies on automatic vulnerability discovery techniques, most notably fuzzing with sanitizers enabled. The current state of the art for applying fuzzing or sanitization to binaries is dynamic binary translation, which has prohibitive performance overhead. The alternate technique, static binary rewriting, cannot fully recover symbolization information and hence has difficulty modifying binaries to track code coverage for fuzzing or to add security checks for sanitizers.The ideal solution for binary security analysis would be a static rewriter that can intelligently add the required instrumentation as if it were inserted at compile time. Such instrumentation requires an analysis to statically disambiguate between references and scalars, a problem known to be undecidable in the …
Total citations
20192020202120222023202432825445422
Scholar articles
S Dinesh, N Burow, D Xu, M Payer - 2020 IEEE Symposium on Security and Privacy (SP), 2020