Show simple item record

dc.identifier.urihttp://hdl.handle.net/1951/53476
dc.identifier.urihttp://hdl.handle.net/11401/71077
dc.description.sponsorshipThis work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree.en_US
dc.formatMonograph
dc.format.mediumElectronic Resourceen_US
dc.language.isoen_US
dc.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dc.typeThesis
dcterms.abstractDisassembly of binaries plays an important role in computer security.Tools for binary analysis and reverse engineering rely heavily on staticdisassembly. Current disassemblers are not able to reliably disassembleexecutables or libraries that contain data (or junk bytes) in the midst ofcode, or make extensive use of indirect jumps or calls. These features cancause these tools to fail silently, thus making them inappropriate forapplications that critically depend on correct disassembly, e.g., binaryinstrumentation. An incorrectly disassembled binary can lead to incorrectinstrumentation, which can in turn cause the instrumented program to fail,or more generally, exhibit differences in behavior from the originalbinary. In this thesis, we analyze existing disassembly approaches, theirshortcomings, and propose a technique to overcome these shortcomings. Weinvestigate the use of static data flow analysis and type analysis toovercome the many challenges posed by disassembly of commercial off-the-shelfsoftware binaries.
dcterms.available2012-05-11T13:35:00Z
dcterms.available2015-04-24T14:45:51Z
dcterms.contributorR, Sekaren_US
dcterms.contributorRobert Johnsonen_US
dcterms.contributorC R. Ramakrishnan.en_US
dcterms.creatorAyyangar, Arvind Narasimhan
dcterms.dateAccepted2012-05-11T13:35:00Z
dcterms.dateAccepted2015-04-24T14:45:51Z
dcterms.dateSubmitted2012-05-11T13:35:00Z
dcterms.dateSubmitted2015-04-24T14:45:51Z
dcterms.descriptionDepartment of Computer Scienceen_US
dcterms.formatApplication/PDFen_US
dcterms.formatMonograph
dcterms.identifierhttp://hdl.handle.net/1951/53476
dcterms.identifierAyyangar_grad.sunysb_0771M_10271.pdfen_US
dcterms.identifierhttp://hdl.handle.net/11401/71077
dcterms.issued2010-08-01
dcterms.languageen_US
dcterms.provenanceMade available in DSpace on 2012-05-11T13:35:00Z (GMT). No. of bitstreams: 1 Ayyangar_grad.sunysb_0771M_10271.pdf: 516923 bytes, checksum: 5a89a70750560fcda63d890e3ba68ee7 (MD5) Previous issue date: 1en
dcterms.provenanceMade available in DSpace on 2015-04-24T14:45:51Z (GMT). No. of bitstreams: 3 Ayyangar_grad.sunysb_0771M_10271.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5) Ayyangar_grad.sunysb_0771M_10271.pdf.txt: 62641 bytes, checksum: d60e5d0627417762e712028be92e57d9 (MD5) Ayyangar_grad.sunysb_0771M_10271.pdf: 516923 bytes, checksum: 5a89a70750560fcda63d890e3ba68ee7 (MD5) Previous issue date: 1en
dcterms.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dcterms.subjectbinary, disassembly, intra-procedural data flow, security, ssa, type analysis
dcterms.titleStatic Disassembly Of Stripped Binaries
dcterms.typeThesis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record