Executable Program Structural Representation Tool Based on Flow Analysis

WANG Wei,WEI Tao,LUO Hai-ning
DOI: https://doi.org/10.3321/j.issn:1002-8331.2007.16.029
2007-01-01
Computer Engineering and Applications Journal
Abstract:The first step of directly analyzing security vulnerabilities of an executable program is to obtain a structural intermediate representation of its binary code.This paper explores application of flow analysis in assembler understanding,and introduces a lightweight prototype of assembler structural representation tool that we implemented on Linux,named BESTAR.The system uses control flow analysis and data flow analysis techniques to identify common control structures,analyzes executive flow of a program,reconstruct expressions and functions,finds data dependency,finally transforms the assembler into a structural and easy-understanding intermediate language program and makes a good preparation for further security analysis.
What problem does this paper attempt to address?