Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik GmbH Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik GmbH scholarly article en King, Andy M.; Mycroft, Alan; Reps, Thomas W.; Simon, Axel http://www.dagstuhl.de/dagrep License
when quoting this document, please refer to the following
DOI:
URN: urn:nbn:de:0030-drops-34585
URL:

; ; ;
Weitere Beteiligte (Hrsg. etc.): Andy M. King and Alan Mycroft and Thomas W. Reps and Axel Simon

Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)

pdf-format:


Abstract

This report documents the program and the outcomes of Dagstuhl Seminar 12051 ``Analysis of Executables: Benefits and Challenges''. The seminar had two focus groups: security engineers who need to find bugs in existing software systems and people in academia who try to build automated tools to prove correctness. The meeting of these diverse groups was beneficial and productive for all involved.

BibTeX - Entry

@Article{king_et_al:DR:2012:3458,
  author =	{Andy M. King and Alan Mycroft and Thomas W. Reps and Axel Simon},
  title =	{{Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)}},
  pages =	{100--116},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{1},
  editor =	{Andy M. King and Alan Mycroft and Thomas W. Reps and Axel Simon},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2012/3458},
  URN =		{urn:nbn:de:0030-drops-34585},
  doi =		{http://dx.doi.org/10.4230/DagRep.2.1.100},
  annote =	{Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation}
}

Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation
Seminar: Dagstuhl Reports, Volume 2, Issue 1
Issue date: 2012
Date of publication: 2012


DROPS-Home | Fulltext Search | Imprint Published by LZI