Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
WETICE, pp. 235-240, 2018.
Approaches for the automatic analysis of security policies on source code level cannot trivially be applied to binaries. This is due to the lacking high-level semantics of low-level object code, and the fundamental problem that control-flow recovery from binaries is difficult. We present a novel approach to recover the control-flow of bin...More
Full Text (Upload PDF)
PPT (Upload PPT)