LZI - Schloss Dagstuhl - Talks + Materials of Seminar 12051

Seminar 12051
Analysis of Executables: Benefits and Challenges

Andy M. King (University of Kent, GB), Alan Mycroft (University of Cambridge, GB), Thomas W. Reps (University of Wisconsin - Madison, US), Axel Simon (TU München, DE)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.


Seminar Wide Materials

Gogul Balakrishnan , NEC Laboratories America, Inc. - Princeton
 A tale of two tools: BEST & GIRA
Abstracts: txttxt


Sebastien Bardin , CEA - Gif sur Yvette
 Refinement-based CFG reconstruction from unstructured programs
Abstracts: txttxt Slides: pdf


Edward Barrett , University of Kent

Sebastian Biallas , RWTH Aachen
 Model Checking PLC Programs
Abstracts: txt


Joerg Brauer , RWTH Aachen
 On Backward Analysis in Binary Code using SAT/SMT
Abstracts: txt Slides: pdf


Doina Bucur , INCAS3

Mihai Christodorescu , IBM TJ Watson Research Center - Hawthorne

Bjorn De Sutter , Ghent University
 Evaluating Binary Code Diversification
Abstracts: txt Slides: pdf


Thomas Dullien , Google Switzerland - Zürich
 Comparison, Navigation, Classification
Abstracts: txt Slides: pdf


Emmanuel Fleury , Université Bordeaux
 Insight Framework: Yet Another Executable Binary Analysis Framework...
Abstracts: txt Slides: pdf


Andrea Flexeder , TWT GmbH
 Fast Linear Two Variable Equalities
Abstracts: txt Slides: pdf


Roberto Giacobazzi , Università degli Studi di Verona
 Metamorphic (x)Code Analysis by Abstract Interpretation
Abstracts: txt Slides: pdf


Sean Heelan , Immunity Inc.

Paul Irofti , FileMedic Ltd.
 Emulator Design, Traps and Pitfalls
Abstracts: txt Slides: pdf


Johannes Kinder , EPFL - Lausanne
 Jakstab & Alternating Control Flow Reconstruction
Abstracts: txt Slides: pdf


Andy M. King , University of Kent
 Transfer Function Synthesis at the Bit-level
Abstracts: txtpdf Slides: pdf


Arun Lakhotia , Univ. of Louisiana - Lafayette
 Context sensitive analysis without calling context
Abstracts: txt Slides: ppt

 In Site Reuse of Functional Components of Binaries
Abstracts: txt Slides: pptx


Jerome Leroux , Université Bordeaux

Junghee Lim , University of Wisconsin - Madison
 TSL: A System for Automatically Creating Analyzers and its Applications
Abstracts: txt Slides: pptx


Alexey Loginov , GrammaTech Inc.- Ithaca
 Scalable Vulnerability Detection in Machine Code
Abstracts: txt Slides: pdf


Florian Martin , AbsInt - Saarbrücken
 Challenges in WCET Analysis
Slides: pdf


David Melski , GrammaTech Inc.- Ithaca
 PEASOUP: Preventing Exploits Against Software Of Uncertain Provenance
Abstracts: txt


Bogdan Mihaila , TU München

Barton P. Miller , University of Wisconsin - Madison
 Binary Code Analysis and Modification with Dyninst
Abstracts: txt


Martin Murfitt , Trustwave Ltd., London

Alan Mycroft , University of Cambridge
 Decompilation, type inference and finding code
Abstracts: txt Slides: pdf


Magnus Myreen , University of Cambridge

Michael Petter , TU München

Thomas W. Reps , University of Wisconsin - Madison
 There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
Abstracts: txt Slides: ppt


Xavier Rival , ENS - Paris
 Shape analysis of low level codes
Abstracts: txt Slides: pdf


Edward Robbins , University of Kent

Daniel Roelker , DARPA - Arlington

Andrew Ruef , University of Maryland - College Park

Alexander Sepp , TU München

Holger Siegel , TU München

Axel Simon , TU München
 Combining several analyses into one OR What is a good intermediate language for the analysis of executables?
Abstracts: txt Slides: pdf


Fausto Spoto , Università degli Studi di Verona
 Constraint-based Static Analysis of Java Bytecode
Abstracts: txt Slides: pdf


Aditya Thakur , University of Wisconsin - Madison
 A Method for Symbolic Computation of Abstract Operations
Abstracts: txt Slides: pptx


Christopher Vick , Qualcomm Corp.R&D, Santa Clara

Aymeric Vincent , Université Bordeaux

Andrew Walenstein , University of Louisiana at Lafayette
 Adversarial Program Analysis and Malware Genomics
Abstracts: txt Slides: pdf


Florian Zuleger , TU Wien


Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: