CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that are similar to those that a compiler creates for a program written in a high-level language. A major challenge in building an analysis tool for executables is in providing useful information about operations involving memory. This is difficult when symbol-table and debugging information is absent or untrusted. CodeSurfer/x86 overcomes these challenges to provide an analyst with a powerful and flexible platform for investigating the properties and behaviors of potentially malicious code (such as COTS components, plugins, mobile code, worms, Trojans, and virus-infected code) using (i) CodeSurfer/x86's GUI, (ii) CodeSurfer/x86's scripting language, which provides access to all of the intermediate representations that CodeSurfer/x86 builds for the executable, and (iii) GrammaTech's Path Inspector, which is a tool that uses a sophisticated pattern-matching engine to answer questions about the flow of execution in a program. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Balakrishnan, G., Gruian, R., Reps, T., & Teitelbaum, T. (2005). CodeSurfer/x86-A platform for analyzing x86 executables. In Lecture Notes in Computer Science (Vol. 3443, pp. 250–254). Springer Verlag. https://doi.org/10.1007/978-3-540-31985-6_19
Mendeley helps you to discover research relevant for your work.