Forced Execution for Security Analysis of Software Without Source Code
F Peng - 2021 - search.proquest.com
2021•search.proquest.com
Binary code analysis is widely used in many applications, including reverse engineering,
software forensics and security. It is very critical in these applications, since the analysis of
binary code does not require source code to be available. For example, in one of the
security applications, given a potentially malicious executable file, binary analysis can help
building human inspectable representations such as control flow graph and call graph.
software forensics and security. It is very critical in these applications, since the analysis of
binary code does not require source code to be available. For example, in one of the
security applications, given a potentially malicious executable file, binary analysis can help
building human inspectable representations such as control flow graph and call graph.
Abstract
Binary code analysis is widely used in many applications, including reverse engineering, software forensics and security. It is very critical in these applications, since the analysis of binary code does not require source code to be available. For example, in one of the security applications, given a potentially malicious executable file, binary analysis can help building human inspectable representations such as control flow graph and call graph.
ProQuest
Showing the best result for this search. See all results