Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Browse all Theses and Dissertations

Analysis

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer Jan 2022

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer

Browse all Theses and Dissertations

Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …


Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett Jan 2020

Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett

Browse all Theses and Dissertations

Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.


Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley Jan 2016

Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley

Browse all Theses and Dissertations

With the widespread adoption of dynamic web applications in recent years, a number of threats to the security of these applications have emerged as significant challenges for application developers. The security of developed applications has become a higher priority for both developers and their employers as cyber attacks become increasingly more prevalent and damaging. Some of the most used web application frameworks are written in PHP and have become major targets due to the large number of servers running these applications worldwide. A number of tools exist to evaluate PHP code for issues, however most of these applications are not …