Introduction to Procedural Debugging through binary libification
Introduction to Procedural Debugging through binary libification
Jonathan Brossard
Conservatoire National des Arts et Métiers, Paris
[10] S Sibi Chakkaravarthy, Dhamodara Sangeetha, and [21] Hiroaki Etoh and Kunikazu Yoda. Propolice: Protecting
V Vaidehi. A survey on malware analysis and miti- from stack-smashing attacks. Technical Report, IBM
gation techniques. Computer Science Review, 32:1–23, Research Division, Tokyo Research Laboratory, 2000.
2019.
[22] Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard
[11] Buddhika Chamith, Bo Joel Svensson, Luke Dalessan- Shrobe, Martin Rinard, Hamed Okhravi, and Stelios
dro, and Ryan R Newton. Instruction punning: Sidiroglou-Douskos. Control jujutsu: On the weak-
Lightweight instrumentation for x86-64. In Proceedings nesses of fine-grained control flow integrity. In Proceed-
of the 38th ACM SIGPLAN Conference on Programming ings of the 22nd ACM SIGSAC Conference on Computer
Language Design and Implementation, pages 320–332, and Communications Security, pages 901–913, 2015.
2017.
[23] Jeff Gennari, Shaun Hedrick, Frederick W Long, Justin
[12] Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Pincar, and Robert C Seacord. Ranged integers for the
Nyman, Haipeng Cai, Trent Jaeger, N Asokan, and Dan- c programming language. 2007.
feng Yao. Exploitation techniques for data-oriented
attacks with existing and potential defense approaches. [24] Matthew Green, Mathias Hall-Andersen, Eric Hen-
ACM Transactions on Privacy and Security (TOPS), nenfent, Gabriel Kaptchuk, Benjamin Perez, and Gijs
24(4):1–36, 2021. Van Laer. Efficient proofs of software exploitability for
real-world processors. Proceedings on Privacy Enhanc-
[13] Tsung-Huan Cheng, Ying-Dar Lin, Yuan-Cheng Lai, and ing Technologies, 2023.
Po-Ching Lin. Evasion techniques: Sneaking through
your intrusion detection/prevention systems. IEEE [25] Roberto Ierusalimschy. Programming in lua. Roberto
Communications Surveys & Tutorials, 14(4):1011–1020, Ierusalimschy, 2006.
2011.
[26] Changhee Jung, Duk-Kyun Woo, Kanghee Kim, and
[14] Greg Cooper. Dtrace: dynamic tracing in oracle so- Sung-Soo Lim. Performance characterization of prelink-
laris, mac os x, and free bsd by brendan gregg and jim ing and preloadingfor embedded systems. In Proceed-
mauro. ACM SIGSOFT Software Engineering Notes, ings of the 7th ACM & IEEE international conference
37:34, 2012. on Embedded software, pages 213–220, 2007.