Logo des Repositoriums
 

Structural comparison of executable objects

dc.contributor.authorFlake, Halvar
dc.contributor.editorFlegel, Ulrich
dc.contributor.editorMeier, Michael
dc.date.accessioned2019-10-16T08:50:49Z
dc.date.available2019-10-16T08:50:49Z
dc.date.issued2004
dc.description.abstractA method to heuristically construct an isomorphism between the sets of functions in two similar but differing versions of the same executable file is presented. Such an isomorphism has multiple practical applications, specifically the ability to detect programmatic changes between the two executable versions. Moreover, information (function names) which is available for one of the two versions can also be made available for the other . A framework implementing the described methods is presented, along with empirical data about its performance when used to analyze patches to recent security vulnerabilities. As a more practical example, a security update which fixes a critical vulnerability in an H.323 parsing component is analyzed, the relevant vulnerability extracted and the implications of the vulnerability and the fix discussed.en
dc.identifier.isbn3-88579-375-X
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/29199
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofDetection of intrusions and malware & vulnerability assessment, GI SIG SIDAR workshop, DIMVA 2004
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-46
dc.titleStructural comparison of executable objectsen
dc.typeText/Conference Paper
gi.citation.endPage173
gi.citation.publisherPlaceBonn
gi.citation.startPage161
gi.conference.dateJuly 6-7, 2004
gi.conference.locationDortmund
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI.Proceedings.46-11.pdf
Größe:
99.21 KB
Format:
Adobe Portable Document Format