CodeSurfer/x86-A platform for analyzing x86 executables

92Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that are similar to those that a compiler creates for a program written in a high-level language. A major challenge in building an analysis tool for executables is in providing useful information about operations involving memory. This is difficult when symbol-table and debugging information is absent or untrusted. CodeSurfer/x86 overcomes these challenges to provide an analyst with a powerful and flexible platform for investigating the properties and behaviors of potentially malicious code (such as COTS components, plugins, mobile code, worms, Trojans, and virus-infected code) using (i) CodeSurfer/x86's GUI, (ii) CodeSurfer/x86's scripting language, which provides access to all of the intermediate representations that CodeSurfer/x86 builds for the executable, and (iii) GrammaTech's Path Inspector, which is a tool that uses a sophisticated pattern-matching engine to answer questions about the flow of execution in a program. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Balakrishnan, G., Gruian, R., Reps, T., & Teitelbaum, T. (2005). CodeSurfer/x86-A platform for analyzing x86 executables. In Lecture Notes in Computer Science (Vol. 3443, pp. 250–254). Springer Verlag. https://doi.org/10.1007/978-3-540-31985-6_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free