Dynamic and Static Methods for Program Analysis

Noam Rinetzky - 2012/13 (Semester B)

The seminar focuses on dynamic and static methods for program analysis. We shall read recent papers in this area, focusing on their application for security.

Administration

Papers

Topic References Presenter
Memory Safety - Dynamic DieHard: Probabilistic Memory Safety for Unsafe Languages
Memory Safety - Dynamic Exterminator: Automatically Correcting Memory Errors with High Probability
Static AEG: Automatic Exploit Generation
Web Apps - Static The Essence of Command Injection Attacks in Web Applications
Memory Safety - Dynamic EXE: Automatically Generating Inputs of Death
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
Static S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems.
Static MOPS: an Infrastructure for Examining Security Properties of Software
Static DIVINE: DIscovering Variables IN Executables
Static Who Wrote This Code? Identifying the Authors of Program Binaries
Dynamic Differential Slicing: Identifying Causal Execution Differences for Security Applications
Static Loop-extended Symbolic Execution: Buffer Overflow Diagnosis and Discovery
Misc Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
Static Execution Synthesis: A Technique for Automated Software Debugging
Static Automatic Discovery of Deviations in Binary Implementations
Dynamic Dynamic test generation to find integer bugs in x86 binary Linux programs
Scripting Languages - Static Static Detection of Security Vulnerabilities in Scripting Languages
Web - Static VEX: Vetting Browser Extensions For Security Vulnerabilities
Memory Safety - Static CCured: Type-Safe Retrofitting of Legacy Code
Static Scalable and Systematic Detection of Buggy Inconsistencies in Source Code
Dynamic Bug Isolation via Remote Program Sampling
Dynamic Binary-Code Obfuscations in Prevalent Packer Tools
Static Low-Effort Equivalence Verification of Real Code
Dynamic SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures