Computer security analysis through decompilation and high-level debugging

被引:6
|
作者
Cifuentes, C [1 ]
Waddington, T [1 ]
Van Emmerik, M [1 ]
机构
[1] Sun Microsyst Labs, Palo Alto, CA 94303 USA
关键词
D O I
10.1109/WCRE.2001.957846
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The extensive use of computers and networks worldwide has raised the awareness of the need for tools and techniques to aid in computer security analysis of binary code, such as the understanding of viruses, trojans, worms, back-doors and general security flaws, in order to provide immediate solutions with or without the aid of software vendors. This paper is a proposal for a high-level debugging tool to be used by computer security experts, which will reduce the amount of time needed in order to solve security-related problems in executable programs. The current state of the art involves the tracing of thousands of lines of assembly code using a standard debugger. A high-level debugger would be capable of displaying a high-level representation of an executable program in the C language, hence reducing the number of lines that need to be inspected by an order of magnitude (i.e. hundreds instead of thousands of lines). Effectively, these techniques will help in reducing the amount of time needed to trace a security flaw in an executable program, as well as reducing the costs of acquiring or training skilled assembler engineers.
引用
收藏
页码:375 / 380
页数:6
相关论文
共 50 条
  • [41] PROGRAM MEASUREMENTS ON A HIGH-LEVEL LANGUAGE COMPUTER
    DITZEL, DR
    COMPUTER, 1980, 13 (08) : 62 - 72
  • [42] COMPUTER WITH HARDWARE IMPLEMENTATION OF HIGH-LEVEL LANGUAGES
    GLUSHKOV, VM
    MIKHNOVSKII, SD
    RABINOVICH, ZL
    CYBERNETICS, 1981, 17 (04): : 506 - 514
  • [43] A CHARACTER COMPUTER FOR HIGH-LEVEL LANGUAGE INTERPRETATION
    MEGGITT, JE
    IBM SYSTEMS JOURNAL, 1964, 3 (01) : 68 - 78
  • [44] CONSTRUCTION OF HIGH-LEVEL PROTOCOLS FOR COMPUTER-COMPUTER COMMUNICATION
    OHSHIMA, Y
    NAKAGAWA, Y
    KATAOKA, Y
    REVIEW OF THE ELECTRICAL COMMUNICATIONS LABORATORIES, 1980, 28 (3-4): : 208 - 217
  • [45] Effective Simulation and Debugging for a High-Level Hardware Language using Software Compilers
    Pit-Claudel, Clement
    Bourgeat, Thomas
    Lau, Stella
    Arvind
    Chlipala, Adam
    ASPLOS XXVI: TWENTY-SIXTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2021, : 789 - 803
  • [46] HIGH-LEVEL COMMAND-LANGUAGE SPEEDS COMPLEX-SYSTEM DEBUGGING
    BAHLES, S
    MILLER, WA
    YEE, F
    WEST, D
    CLARK, J
    ELECTRONICS, 1983, 56 (02): : 107 - 111
  • [47] Towards High-Level Human Activity Recognition through Computer Vision and Temporal Logic
    Ijsselmuiden, Joris
    Stiefelhagen, Rainer
    KI 2010: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2010, 6359 : 426 - 435
  • [48] High-Level Feature Extraction for Crowd Behaviour Analysis: A Computer Vision Approach
    Bruno, Alessandro
    Ferjani, Marouane
    Sabeur, Zoheir
    Arbab-Zavar, Banafshe
    Cetinkaya, Deniz
    Johnstone, Liam
    Sallal, Muntadher
    Benaouda, Djamel
    IMAGE ANALYSIS AND PROCESSING, ICIAP 2022 WORKSHOPS, PT II, 2022, 13374 : 59 - 70
  • [49] Towards automation of testing high-level security properties
    Hanna, Aiman
    Ling, Hai Zhou
    Furlong, Jason
    Debbabi, Mourad
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 268 - 282
  • [50] SecHLS: Enabling Security Awareness in High-Level Synthesis
    Shi, Shang
    Pundir, Nitin
    Kamali, Hadi M.
    Tehranipoor, Mark
    Farahmandi, Farimah
    2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 585 - 590