News Items
Dyninst 8.0
has been released.
MRNet 4.0.0 has been released.
The
2012 Paradyn/Dyninst Annual Meeting
was held March 26-28, 2012 on the University of Maryland campus.
MRNet 3.1.0 has been released.
The Paradyn/Dyninst Annual Meeting
was held in Madison May 2-3, 2011, in the beautiful new
Wisconsin Institutes for Discovery
building.
Dyninst 7.0.1, SymtabAPI 7.0.1, StackwalkerAPI 2.1,
InstructionAPI 7.0.1, ParseAPI 1.0.1, ProcControlAPI 1.0.1, and DynC 1.0.1
have been
released.
The Paradyn group had a great research exhibit at
the SC2009
Conference.
See our group photo
from the conference.
Recent Papers
On editing binaries by transforming their CFG:
"Structured
Binary Editing with a CFG Transformation Algebra"
by Bernat and Miller, Working Conference on Reverse Engineering
(WCRE), Kingston, Ontario, Canada, October 2012.
On prevalent obfuscations used by malware:
"Binary Code Obfuscations
in Prevalent Packer Tools"
by Roundy and Miller, ACM Computing Surveys.
On providing library function information for stripped binaries:
"Labeling Library Functions In Stripped Binaries"
by Jacobson, Rosenblum, and Miller, ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering (PASTE), Szeged, Hungary, September 2011.
On graph transformation-based binary
instrumentation:
"Anywhere, Any Time Binary Instrumentation"
by Bernat and Miller, ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering (PASTE), Szeged, Hungary, September 2011.
On determining the authors of program binaries:
"Who Wrote This Code? Identifying the Authors of Program Binaries" by Rosenblum,
Zhu, and Miller, European Symposium on Research in Computer Security (ESORICS), Leuven, Belgium, September 2011.
On inferring the source language and toolchain details from binary code characteristics:
"Recovering
the Toolchain Provenance of Binary Code" by Rosenblum,
Miller, and Zhu, International Symposium on Software Testing and Analysis (ISSTA), Toronto, Canada, July 2011.
On using binary analysis to make instrumentation more
efficient and effective against tamper-resistant
programs:
"Efficient, Sensitivity Resistant Binary Instrumentation" by
Bernat, Roundy, and Miller, International Symposium on Software
Testing and Analysis (ISSTA), Toronto, Canada, July 2011.
On scalable composition of a single-system image name space from thousands of
independent file servers for use in building scalable tools and middleware:
"FINAL: Flexible and Scalable Composition of File System Name Spaces"
by Brim, Miller, and Zandy,
International Workshop on Runtime and Operating Systems for Supercomputers 2011 (ROSS'11), Tucson, Arizona, May 2011.
On analyzing and instrumenting
binaries that are obfuscated, packed, and self-modifying:
"Hybrid Analysis and Control of Malware Binaries"
by Roundy and Miller,
Recent Advances in Intrusion Detection (RAID), Ottawa, Canada. September 2010.
On using MRNet on Cray XT platforms: MRNet: A Scalable Infrastructure for the Development of Parallel Tools and Applications
by Brim, DeRose, Miller, Olichandran, and Roth,
Cray User Group, Edinburgh, Scotland. May 2010.
On a new, lightweight library for MRNet: A Lightweight Library for Building Scalable Tools"
by Jacobson, Brim, and Miller,
Para 2010: State of the Art in Scientific and Parallel Computing, Reykjavik, Iceland. June 2010.
On determining the source compiler from binary code:
"Extracting Compiler Provenance from Program Binaries"
by Rosenblum, Miller, and Zhu,
ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering (PASTE), Toronto, Canada. June 2010.