BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Memento EPFL//
BEGIN:VEVENT
SUMMARY:Empowering static binary rewriting through recovered structured in
 formation
DTSTART:20220131T170000
DTEND:20220131T190000
DTSTAMP:20260503T111200Z
UID:4de96b7785c4be6f390d0ecb80c791fbd055951552d91ba34d8cd6c2
CATEGORIES:Conferences - Seminars
DESCRIPTION:Luca Di Bartolomeo\nEDIC candidacy exam\nExam president: Prof.
  James Larus\nThesis advisor: Prof. Mathias Payer\nCo-examiner: Prof. Sani
 dhya Kashyap\n\nAbstract\nClosed source programs are particularly challeng
 ing to audit. Even on the most popular open-source operating systems\, end
 -users are often required to run third-party binary blobs.\n\nStatic rewri
 ting is the process of applying modifications on an already compiled progr
 am\, with the goal of patching bugs\, hardening exploitation\, and providi
 ng better profiling tools.\nHowever\, static rewriting is severely limited
  by the scarcity of information present in a binary without the possession
  of its source code\, such as abstractions in object-oriented languages (e
 .g.\, C++).\n\nThe amount of information and metadata that we are able to 
 recover from a binary directly influences the chances of a success-full re
 writing.  Recovering as many abstractions as possible is crucial part of 
 static rewriting\, and the main goal of this research is to have a look at
  how much knowledge we can still infer from a closed-source program.\n\nBa
 ckground papers\nUsing Logic Programming to Recover C++ Classes and Method
 s from Compiled Executables [1]\nhttps://dl.acm.org/doi/pdf/10.1145/324373
 4.3243793\n\nYour Exploit is Mine: Automatic Shellcode Transplant for Remo
 te Exploits\nhttps://www.ieee-security.org/TC/SP2017/papers/579.pdf\n\n(St
 ate of) The Art of War: Offensive Techniques in Binary Analysis\nhttps://i
 eeexplore.ieee.org/abstract/document/7546500\n\n\n\n 
LOCATION:
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
