Paper
12 January 2012 Attack diagnosis on binary executables using dynamic program slicing
Shan Huang, Yudi Zheng, Ruoyu Zhang
Author Affiliations +
Abstract
Nowadays, the level of the practically used programs is often complex and of such a large scale so that it is not as easy to analyze and debug them as one might expect. And it is quite difficult to diagnose attacks and find vulnerabilities in such large-scale programs. Thus, dynamic program slicing becomes a popular and effective method for program comprehension and debugging since it can reduce the analysis scope greatly and drop useless data that do not influence the final result. Besides, most of existing dynamic slicing tools perform dynamic slicing in the source code level, but the source code is not easy to obtain in practice. We believe that we do need some kinds of systems to help the users understand binary programs. In this paper, we present an approach of diagnosing attacks using dynamic backward program slicing based on binary executables, and provide a dynamic binary slicing tool named DBS to analyze binary executables precisely and efficiently. It computes the set of instructions that may have affected or been affected by slicing criterion set in certain location of the binary execution stream. This tool also can organize the slicing results by function call graphs and control flow graphs clearly and hierarchically.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Shan Huang, Yudi Zheng, and Ruoyu Zhang "Attack diagnosis on binary executables using dynamic program slicing", Proc. SPIE 8350, Fourth International Conference on Machine Vision (ICMV 2011): Computer Vision and Image Analysis; Pattern Recognition and Basic Technologies, 83500Z (12 January 2012); https://doi.org/10.1117/12.923765
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Binary data

Diagnostics

Analytical research

Detection and tracking algorithms

Information security

Computer networks

Information operations

RELATED CONTENT

Measuring of network vulnerability
Proceedings of SPIE (September 02 2003)
Computing the ULLV decomposition
Proceedings of SPIE (October 28 1994)
Fault diagnosis of dynamic memory board
Proceedings of SPIE (August 28 1995)

Back to Top