all InfoSec news
Reverse Engineering Structure and Semantics of Input of a Binary Executable
May 24, 2024, 4:12 a.m. | Seshagiri Prabhu Narasimha, Arun Lakhotia
cs.CR updates on arXiv.org arxiv.org
Abstract: Knowledge of the input format of binary executables is important for finding bugs and vulnerabilities, such as generating data for fuzzing or manual reverse engineering. This paper presents an algorithm to recover the structure and semantic relations between fields of the input of binary executables using dynamic taint analysis. The algorithm improves upon prior work by not just partitioning the input into consecutive bytes representing values but also identifying syntactic components of structures, such as …
algorithm arxiv binary bugs cs.cr data engineering fuzzing important input knowledge recover reverse reverse engineering semantic semantics structure vulnerabilities
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Ingénieur Développement Logiciel IoT H/F
@ Socomec Group | Benfeld, Grand Est, France
Architecte Cloud – Lyon
@ Sopra Steria | Limonest, France
Senior Risk Operations Analyst
@ Visa | Austin, TX, United States
Military Orders Writer
@ Advanced Technology Leaders, Inc. | Ft Eisenhower, GA, US
Senior Golang Software Developer (f/m/d)
@ E.ON | Essen, DE
Senior Revenue Operations Analyst (Redwood City)
@ Anomali | Redwood City, CA