Cited 0 time in
The x86/64 binary code to smart intermediate language translation for software weakness
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeong, J. | - |
| dc.contributor.author | Son, Y. | - |
| dc.contributor.author | Oh, S. | - |
| dc.date.accessioned | 2024-08-08T06:30:57Z | - |
| dc.date.available | 2024-08-08T06:30:57Z | - |
| dc.date.issued | 2017-08-25 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/19036 | - |
| dc.description.abstract | Today, the proportion of software in society as a whole is steadily increasing. In addition to size of software increasing, the number of cases dealing with personal information is also increasing. This shows the importance of weekly software security verification. However, software security is very difficult in cases where libraries do not have source code. To solve this problem, it is necessary to develop a technique for checking existing binary security weaknesses. To this end, techniques for analyzing security weaknesses using intermediate languages are actively being discussed. In this paper, we propose a system that translate binary code to intermediate language to effectively analyze existing security weaknesses within binary code. © 2017 Association for Computing Machinery. | - |
| dc.format.extent | 6 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Association for Computing Machinery | - |
| dc.title | The x86/64 binary code to smart intermediate language translation for software weakness | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1145/3133264.3133295 | - |
| dc.identifier.scopusid | 2-s2.0-85033558705 | - |
| dc.identifier.bibliographicCitation | ACM International Conference Proceeding Series, v.Part F131200, pp 129 - 134 | - |
| dc.citation.title | ACM International Conference Proceeding Series | - |
| dc.citation.volume | Part F131200 | - |
| dc.citation.startPage | 129 | - |
| dc.citation.endPage | 134 | - |
| dc.type.docType | Conference Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Binary analysis | - |
| dc.subject.keywordAuthor | Binary code transition | - |
| dc.subject.keywordAuthor | Intermediate language | - |
| dc.subject.keywordAuthor | Software weakness | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
