License
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.2.1.100
URN: urn:nbn:de:0030-drops-34585
URL: http://drops.dagstuhl.de/opus/volltexte/2012/3458/
Go back to Dagstuhl Reports


King, Andy M. ; Mycroft, Alan ; Reps, Thomas W. ; Simon, Axel
Weitere Beteiligte (Hrsg. etc.): Andy M. King and Alan Mycroft and Thomas W. Reps and Axel Simon

Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)

pdf-format:
Document 1.pdf (516 KB)


Abstract

This report documents the program and the outcomes of Dagstuhl Seminar 12051 ``Analysis of Executables: Benefits and Challenges''. The seminar had two focus groups: security engineers who need to find bugs in existing software systems and people in academia who try to build automated tools to prove correctness. The meeting of these diverse groups was beneficial and productive for all involved.

BibTeX - Entry

@Article{king_et_al:DR:2012:3458,
  author =	{Andy M. King and Alan Mycroft and Thomas W. Reps and Axel Simon},
  title =	{{Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)}},
  pages =	{100--116},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{1},
  editor =	{Andy M. King and Alan Mycroft and Thomas W. Reps and Axel Simon},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2012/3458},
  URN =		{urn:nbn:de:0030-drops-34585},
  doi =		{http://dx.doi.org/10.4230/DagRep.2.1.100},
  annote =	{Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation}
}

Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation
Seminar: Dagstuhl Reports, Volume 2, Issue 1
Issue Date: 2012
Date of publication: 10.05.2012


DROPS-Home | Fulltext Search | Imprint Published by LZI