期刊文献+

基于命题演算的高级控制结构恢复

High-level Control Structure Recovery Based on Propositional Calculus
下载PDF
导出
摘要 提出一种基于命题演算的二进制代码高级控制结构恢复方法。该方法针对低级指令之间的控制依赖关系进行形式化,将其抽象为命题逻辑变元,并且沿着程序执行路径进行传播和演算,通过计算结果中的特定命题常元对隐藏于低级代码中的高级控制结构进行判定。测试结果表明,该方法能够较好地检测并恢复出循环结构和分支结构,且具备针对谓词指令的分析和恢复能力。 This paper presents a method to recovery high-level control structures from binary executables,which is based on propositional calculus.This method formalizes the control dependence relation between low-level instructions to propositional variables.These variables can be propagated and calculated follow the execution path of the object code,and high-level control structures can be identified by some specified results of propositional invariants.Experimental results show this method can recognize and recovery loops and conditionals effectively,and have the ability of analyzing the predicated instructions.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第16期4-6,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z408 2009AA01Z434) 河南省重大科技攻关基金资助项目(092101210500 092101210501)
关键词 软件逆向分析 命题逻辑 控制结构恢复 控制依赖 reverse analysis of software propositional logic control structure recovery control dependence
  • 相关文献

参考文献5

  • 1Moretti E,Chanteperdrix G,Osorio A.New Algorithms for Control-flow Graph Structuring[C] //Proc.of CSMR'01.Washington,USA:[s.n.] ,2001. 被引量:1
  • 2Tao Wei,Mao Jian,Zou Wei,et al.A New Algorithm for Identifying Loops in Decompilation[Z].(2007-08-22).http://www.springerlink.com/content/yt2h26666k63g04q/. 被引量:1
  • 3Tao Wei,Mao Jian,Zou Wei,et al.Structuring 2-way Branches in Binary Executables[C] //Proc.of the 31st Annual International Computer Software and Applications Conference.Beijing,China:[s.n.] ,2007. 被引量:1
  • 4Cristina C,Mike V E.Recovery of Jump Table Case Statements from Binary Code[J].Science of Computer Programming,2001,40(2/3):171-188. 被引量:1
  • 5王成,庞建民,赵荣彩,王强.基于可疑行为识别的PE病毒检测方法[J].计算机工程,2009,35(15):132-134. 被引量:6

二级参考文献4

  • 1Skoudis E,Zehser L.Malware:Fighting Malicious Code[M].[S.l.]:Prentice Hall,2003. 被引量:1
  • 2Kruegel C,Robertson W,Valeur F,et al.Static Disassembly of Obfuscatod Binaries[D].Santa Barbara,CA,USA:Reliable Software Group,Computer Science Department,University of California,2004. 被引量:1
  • 3Christodorescu M,Jha S.Static Analysis of Executables to Detect Malicious Patterns[C]//Proceedings of the 12th USENIX Security Symposium.BerKeley,CA,USA:[s.n.],2003. 被引量:1
  • 4戴超,庞建民,赵荣彩.采用条件跳转混淆技术的恶意代码反汇编[J].计算机工程,2008,34(8):153-155. 被引量:5

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部