Dynamic and Static Methods for Program Analysis
Noam Rinetzky - 2012/13 (Semester B)
The seminar focuses on dynamic and static methods for program analysis. We shall read recent papers in this area, focusing on their application for security.
Administration
Time: Wednesday, 4pm-6pm
Location: Scheriber 210
Course Number: 0368-3500-37/8
Papers
Topic
References
Presenter
Memory Safety - Dynamic
DieHard: Probabilistic Memory Safety for Unsafe Languages
Memory Safety - Dynamic
Exterminator: Automatically Correcting Memory Errors with High Probability
Static
AEG: Automatic Exploit Generation
Web Apps - Static
The Essence of Command Injection Attacks in Web Applications
Memory Safety - Dynamic
EXE: Automatically Generating Inputs of Death
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
Static
S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems.
Static
MOPS: an Infrastructure for Examining Security Properties of Software
Static
DIVINE: DIscovering Variables IN Executables
Static
Who Wrote This Code? Identifying the Authors of Program Binaries
Dynamic
Differential Slicing: Identifying Causal Execution Differences for Security Applications
Static
Loop-extended Symbolic Execution: Buffer Overflow Diagnosis and Discovery
Misc
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
Static
Execution Synthesis: A Technique for Automated Software Debugging
Static
Automatic Discovery of Deviations in Binary Implementations
Dynamic
Dynamic test generation to find integer bugs in x86 binary Linux programs
Scripting Languages - Static
Static Detection of Security Vulnerabilities in Scripting Languages
Web - Static
VEX: Vetting Browser Extensions For Security Vulnerabilities
Memory Safety - Static
CCured: Type-Safe Retrofitting of Legacy Code
Static
Scalable and Systematic Detection of Buggy Inconsistencies in Source Code
Dynamic
Bug Isolation via Remote Program Sampling
Dynamic
Binary-Code Obfuscations in Prevalent Packer Tools
Static
Low-Effort Equivalence Verification of Real Code
Dynamic
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures