Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. HI-CFG: Construction by binary analysis and application to attack polymorphism
 
conference paper

HI-CFG: Construction by binary analysis and application to attack polymorphism

Caselden, Dan
•
Bazhanyuk, Alex
•
Payer, Mathias  
Show more
2013
Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings
18th European Symposium on Research in Computer Security, ESORICS 2013

Security analysis often requires understanding both the control and data-flow structure of a binary. We introduce a new program representation, a hybrid information- and control-flow graph (HI-CFG), and give algorithms to infer it from an instruction-level trace. As an application, we consider the task of generalizing an attack against a program whose inputs undergo complex transformations before reaching a vulnerability. We apply the HI-CFG to find the parts of the program that implement each transformation, and then generate new attack inputs under a user-specified combination of transformations. Structural knowledge allows our approach to scale to applications that are infeasible with monolithic symbolic execution. Such attack polymorphism shows the insufficiency of any filter that does not support all the same transformations as the vulnerable application. In case studies, we show this attack capability against a PDF viewer and a word processor. © 2013 Springer-Verlag.

  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-642-40203-6_10
Scopus ID

2-s2.0-84884780814

Author(s)
Caselden, Dan

FireEye, Inc.

Bazhanyuk, Alex

Intel Corporation

Payer, Mathias  

École Polytechnique Fédérale de Lausanne

McCamant, Stephen

University of Minnesota Twin Cities

Song, Dawn

University of California, Berkeley

Date Issued

2013

Published in
Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings
Series title/Series vol.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 8134 LNCS

ISSN (of the series)

0302-9743

1611-3349

Start page

164

End page

181

Editorial or Peer reviewed

REVIEWED

Written at

OTHER

EPFL units
HEXHIVE  
Event nameEvent acronymEvent placeEvent date
18th European Symposium on Research in Computer Security, ESORICS 2013

United Kingdom

2013-09-09 - 2013-09-13

Available on Infoscience
April 4, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/248628
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés