RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. Dinesh, S., Burow, N., Xu, D., & Payer, M.
abstract   bibtex   
Analyzing the security of closed source binaries is currently impractical for end-users, or even developers who rely on third-party libraries. Such analysis relies on automatic vulnerability discovery techniques, most notably fuzzing with sanitizers enabled. The current state of the art for applying fuzzing or sanitization to binaries is dynamic binary translation, which has prohibitive performance overhead. The alternate technique, static binary rewriting, cannot fully recover symbolization information and hence has difficulty modifying binaries to track code coverage for fuzzing or to add security checks for sanitizers.
@article{dinesh_retrowrite_nodate,
	title = {{RetroWrite}: {Statically} {Instrumenting} {COTS} {Binaries} for {Fuzzing} and {Sanitization}},
	abstract = {Analyzing the security of closed source binaries is currently impractical for end-users, or even developers who rely on third-party libraries. Such analysis relies on automatic vulnerability discovery techniques, most notably fuzzing with sanitizers enabled. The current state of the art for applying fuzzing or sanitization to binaries is dynamic binary translation, which has prohibitive performance overhead. The alternate technique, static binary rewriting, cannot fully recover symbolization information and hence has difficulty modifying binaries to track code coverage for fuzzing or to add security checks for sanitizers.},
	language = {en},
	author = {Dinesh, Sushant and Burow, Nathan and Xu, Dongyan and Payer, Mathias},
	pages = {15}
}

Downloads: 0