期刊文献+

基于静态模拟的二进制控制流恢复算法 被引量:3

Control Flow Restoring Algorithm for Binary Program Based on Static Simulation
在线阅读 下载PDF
导出
摘要 恢复完整的程序控制流图是软件逆向分析的关键,但传统恢复算法依赖于程序结构和编译器信息,不具通用性,无法满足无结构的二进制程序控制流恢复的需要。针对该问题,在传统控制流恢复算法的基础上,提出一种基于静态模拟策略的通用二进制程序控制流恢复算法,并与传统控制流恢复算法、基于切片技术的控制流恢复算法和动态控制流恢复算法在性能上进行比较分析,结果表明,该算法能够恢复出更加完整的控制流图。 Binary program comprehension and analysis are based on Control Flow Graph(CFG) which is the key to reconstruct and reengineering a program and is the basis of software reversing engineering.Classic CFG restoring algorithm that is relevant to program structure and complier information is not applicable to some other binary program.Aiming at this problem,this paper presents a new CFG restoring algorithm that is based on static simulation strategy.The new algorithm derives from the classic CFG restoring method.It compares the new algorithm with other CFG recovery algorithms on performance.Results show that the algorithm can restore control flow from binary program more completely than others.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第5期276-278,281,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01Z434)
关键词 控制流图 静态模拟 二进制程序 Control Flow Graph(CFG) static simulation binary program
  • 相关文献

参考文献3

二级参考文献10

  • 1夏军,杨学军.基于数据空间融合的全局计算与数据划分方法[J].软件学报,2004,15(9):1311-1327. 被引量:7
  • 2谷伟,侯成君.MCS-51智能反汇编软件的设计与实现[J].微电子学与计算机,1993,10(10):21-24. 被引量:2
  • 3吴金波,蒋烈辉.反静态反汇编技术研究[J].计算机应用,2005,25(3):623-625. 被引量:5
  • 4LINN C, DEBRAY S. Obfuscation of executable code to improve resistance to static disassembly[ C]// CCS: Proceedings of the 10th ACM Conference on Computer and Communications Security. [ S. l. ] : ACM Press, 2003. 290 - 299.
  • 5徐士良,葛兵.实用数据结构[M].北京:清华大学出版社.2006:11.
  • 6Kennedy K.Automatic Data Layout for High Performance Fortran[C]//Proc.of Supper-computer Conference.San Diego,Calif.,USA:[s.n.],1995.
  • 7Lim A W,Cheong G I,Lam M S.An Affine Partitioning Algorithm to Maximize Parallelism and Minimize Communication[C]//Proceedings of the 13th ACM SIGARCH International Conference on Supercomputing.[S.l.]:ACM Press,1999:228-237.
  • 8Anderson J M,Lam M S.Global Optimizations for Parallelism and Locality on Scalable Parallel Machines[C]//Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation.[S.l.]:ACM Press,1993:112-125.
  • 9Sadayappan P.Communication-free Hyperplane Partitioning of Nested Loops[J].Journal of Parallel and Distributed Computing,1993,19(2):90-102.
  • 10李学汇.自动反汇编程序的一种解决方案[J].微型机与应用,1997,16(10):7-9. 被引量:4

共引文献3

同被引文献17

  • 1胡刚.固件程序代码逆向分析关键技术研究[D].郑州:郑州信息工程学院,2010.
  • 2Linn C,Debray S.Obfuscation of Executable Code to ImproveResistance to Static Disassembly[C]//Proc.of the l0th ACMConference on Computer and Communications Security.Washington D.C.,USA:[s.n.],2003.
  • 3姜河.基于变形引擎的目标代码混淆方法设计与实现[D].西安:西北大学,2012.
  • 4Dawn S,Brumley D,Caballero J,et al.BitBlaze:A NewApproach to Computer Security via Binary Analysis[C]//Proc.of the 4th International Conference on Information SystemsSecurity.Berlin,Germany:Springer,2008.
  • 5Cristina C.Reverse Compilation Techniques[D].[S.l.]:Queensland University of Technology,1994.
  • 6唐善策,李龙澍,黄刘生.数据结构——用C语言描述[M].北京:高等教育出版,2011.
  • 7Standard Performance Evaluation Corporation.Integer Com-ponent of SPEC CPU2000[EB/OL].(2010-11-21).http://www.spec.org/osg/cpu2000/CINT2000/.
  • 8Micallef S.IDA Plug-in Writing In C/C++[EB/OL].(2010-11-21).http://www.binarypool.com/idapluginwriting.
  • 9Chris E.The IDA Pro Book:The Unofficial Guide to theWorld’s Most Popular Disassembler[M].San Francisco,USA:No Starch Press,2008.
  • 10Bai Li-li,Pang Jian-min,Zhang Ping. Analysing Indirect Table Based on Critical Semantic Subtree[A].2010.9-13.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部