BitBlaze: Binary Analysis for Computer Security: Binary analysis is imperative for protecting COTS (common off-the-shelf) programs and analyzing and defending against the myriad of malicious code, where source code is unavailable, and the binary may even be obfuscated. Also, binary analysis provides the ground truth about program behavior since computers execute binaries (executables), not source code. However, binary analysis is challenging due to the lack of higher-level semantics. Many higher level techniques are often inadequate for analyzing even benign binaries, let alone potentially malicious binaries. Thus, we need to develop tools and techniques which work at the binary level, can be used for analyzing COTS software, as well as malicious binaries. The BitBlaze project aims to design and develop a powerful binary analysis platform and employ the platform in order to (1) analyze and develop novel COTS protection and diagnostic mechanisms and (2) analyze, understand, and develop defenses against malicious code. The BitBlaze project also strives to open new application areas of binary analysis, which provides sound and effective solutions to applications beyond software security and malicious code defense, such as protocol reverse engineering and fingerprint generation. The BitBlaze project consists of two central research directions: (1) the design and development of the underlying BitBlaze Binary Analysis Platform, and (2) applying the BitBlaze Binary Analysis Platform to real security problems. The two research focii drive each other: as new security problems arise, we develop new analysis techniques. Similarly, we develop new analysis techniques in order to better or more efficiently solve known problems. Below, we give an overview of the two research directions.

References in zbMATH (referenced in 11 articles )

Showing results 1 to 11 of 11.
Sorted by year (citations)

  1. Cheng, Xiaoyang; Lin, Yan; Gao, Debin; Jia, Chunfu: DynOpVm: VM-based software obfuscation with dynamic opcode mapping (2019)
  2. Godefroid, Patrice; Sen, Koushik: Combining model checking and testing (2018)
  3. Tan, Gang; Morrisett, Greg: Bidirectional grammars for machine-code decoding and encoding (2018)
  4. Fu, Xiang: On detecting environment sensitivity using slicing (2016)
  5. Padaryan, V.; Getman, A.; Solovyev, M.; Bakulin, M.; Borzilov, A.; Kaushan, V.; Ledovskikh, I.; Markin, Yu.; Panasenko, S.: Methods and software tools to support combined binary code analysis (2014) ioport
  6. Brauer, Jörg; King, Andy; Kowalewski, Stefan: Abstract interpretation of microcontroller code: intervals meet congruences (2013)
  7. Deng, Yi; Zhang, Yang; Cheng, Liang; Sun, Xiaoshan: Static integer overflow vulnerability detection in windows binary (2013) ioport
  8. Ming, Jiang; Pan, Meng; Gao, Debin: iBinHunt: binary hunting with inter-procedural control flow (2013) ioport
  9. Kinder, Johannes; Kravchenko, Dmitry: Alternating control flow reconstruction (2012)
  10. Zhang, Ruoyu; Huang, Shiqiu; Qi, Zhengwei; Guan, Haibing: Static program analysis assisted dynamic taint tracking for software vulnerability discovery (2012) ioport
  11. Song, Dawn; Brumley, David; Yin, Heng; Caballero, Juan; Jager, Ivan; Kang, Min Gyung; Liang, Zhenkai; Newsome, James; Poosankam, Pongsin; Saxena, Prateek: BitBlaze: A new approach to computer security via binary analysis (2008) ioport

Further publications can be found at: