MemBrush:A practical tool to detect custom memory allocators in C binaries

Autor: Asia Slowinska, Xi Chen, Herbert Bos
Přispěvatelé: Computer Systems, Network Institute, Systems and Network Security
Jazyk: angličtina
Rok vydání: 2013
Předmět:
Zdroj: Chen, X, Slowinska, A & Bos, H 2013, MemBrush : A practical tool to detect custom memory allocators in C binaries . in Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013 . Proceedings-Working Conference on Reverse Engineering, WCRE, pp. 477-478, 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, 14/10/13 . https://doi.org/10.1109/WCRE.2013.6671326
Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013, 477-478
STARTPAGE=477;ENDPAGE=478;TITLE=Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013
WCRE
DOI: 10.1109/WCRE.2013.6671326
Popis: Many reversing techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system's malloc and free functions, and track each chunk of memory thus allocated as a data structure. However, many performance-critical applications implement their own custom memory allocators. As a result, current binary analysis techniques for tracking data structures fail on such binaries. We present MemBrush, a new tool to detect memory allocation and deallocation functions in stripped binaries with high accuracy. We evaluated the technique on a large number of real world applications that use custom memory allocators. © 2013 IEEE.
Databáze: OpenAIRE