MemBrush:A practical tool to detect custom memory allocators in C binaries
Autor: | Asia Slowinska, Xi Chen, Herbert Bos |
---|---|
Přispěvatelé: | Computer Systems, Network Institute, Systems and Network Security |
Jazyk: | angličtina |
Rok vydání: | 2013 |
Předmět: | |
Zdroj: | Chen, X, Slowinska, A & Bos, H 2013, MemBrush : A practical tool to detect custom memory allocators in C binaries . in Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013 . Proceedings-Working Conference on Reverse Engineering, WCRE, pp. 477-478, 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, 14/10/13 . https://doi.org/10.1109/WCRE.2013.6671326 Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013, 477-478 STARTPAGE=477;ENDPAGE=478;TITLE=Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013 WCRE |
DOI: | 10.1109/WCRE.2013.6671326 |
Popis: | Many reversing techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system's malloc and free functions, and track each chunk of memory thus allocated as a data structure. However, many performance-critical applications implement their own custom memory allocators. As a result, current binary analysis techniques for tracking data structures fail on such binaries. We present MemBrush, a new tool to detect memory allocation and deallocation functions in stripped binaries with high accuracy. We evaluated the technique on a large number of real world applications that use custom memory allocators. © 2013 IEEE. |
Databáze: | OpenAIRE |
Externí odkaz: |