Essays about: "control-flow graph"

Showing result 1 - 5 of 10 essays containing the words control-flow graph.

  1. 1. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  2. 2. Alternating Control Flow Graph Reconstruction by Combining Constant Propagation and Strided Intervals with Directed Symbolic Execution

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Thomas Peterson; [2019]
    Keywords : Control flow reconstruction; Static analysis; Binary; Symbolic execution; Control flow graph; Kontrollflödesrekonstruktion; Statisk analys; Binär; Symbolisk exekvering; Kontrollflödesgraf;

    Abstract : In this thesis we address the problem of control flow reconstruction in the presence of indirect jumps. We introduce an alternating approach which combines both overand under-approximation to increase the precision of the reconstructed control flow automaton compared to pure over-approximation. READ MORE

  3. 3. Computing component specifications from global system requirements

    University essay from KTH/Teoretisk datalogi, TCS

    Author : Carl Björkman; [2017]
    Keywords : control flow analysis; tableau system; theoretical computer science; program verification; compositional verification; static analysis; control flow;

    Abstract : If we have a program with strict control flow security requirements and want to ensure system requirements by verifying properties of said program, but part of the code base is in the form of a plug-in or third party library which we do not have access to at the time of verification, the procedure presented in this thesis can be used to generate the requirements needed for the plug-ins or third party libraries that they would have to fulfil in order for the final product to pass the given system requirements. This thesis builds upon a transformation procedure that turns control flow properties of a behavioural form into a structural form. READ MORE

  4. 4. Visualization of Code Flow

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Yuri Stange; [2015]
    Keywords : Control Flow Graphs; Sugiyama Framework; Graph Layout Generation;

    Abstract : Visual representation of Control Flow Graphs (CFG) is a feature available in many tools, such as decompilers. These tools often rely on graph drawing frameworks which implement the Sugiyama hierarchical style graph drawing method, a well known method for drawing directed graphs. READ MORE

  5. 5. Generation of dynamic control-dependence graphs for binary programs

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska högskolan

    Author : Jakob Pogulis; [2014]
    Keywords : control-dependencies; control-dependence graph; intel-pin; instrumentation; dynamic analysis; program analysis; dependence graph; dynamic dependence graph; control dependency; control flow analysis; control flow;

    Abstract : Dynamic analysis of binary files is an area of computer science that has many purposes. It is useful when it comes to debugging software in a development environment and the developer needs to know which statements affected the value of a specific variable. READ MORE