[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3372297.3416251acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation

Published: 02 November 2020 Publication History

Abstract

The Fifth Workshop on Forming an Ecosystem Around Software Transformation (FEAST) provides a forum for presentation and discussion of new tools, methodologies, and techniques facilitating the automated or semi-automated transformation and analysis of software executables for improving their security and efficiency without the benefit of any original source code whence they were developed. Late-stage software customization of this form is of particular benefit to security-conscious software consumers who must use closed-source or source-free binary software components in mission-critical settings, or who must harden software against newly emerging attacks not anticipated during the software's original design and development. However, code analysis and transformation becomes much more difficult without the aid of source-level information to provide a context for its intended operation. This outstanding challenge motivates the FEAST Workshop's goal of forming a robust ecosystem of strategies and tools for accomplishing source-free binary code transformation reliably and on-demand.

References

[1]
Swapnil Bhartiya. 2020. Linux in 2020: 27.8 Million Lines of Code in the Kernel, 1.3 Million in systemd. Linux.com (January 2020).
[2]
Sukarno Mertoguno, Ryan Craven, Daniel Koller, and Matthew Mickelson. 2018. Reducing Attack Surface via Executable Transformation. In Proceedings of the IEEE Cybersecurity Development Conference (SecDev). 138.
[3]
Rachel Potvin. 2015. Why Google Stores Billions of Lines of Code in a Single Repository. Systems @Scale, https://youtu.be/W71BTkUbdqE
[4]
Hovav Shacham. 2007. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In Proceedings of the ACM Conference on Computer and Communications Security (CCS). 552--561.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
October 2020
2180 pages
ISBN:9781450370899
DOI:10.1145/3372297
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. binary rewriting
  2. binary software
  3. software de-layering
  4. software debloating
  5. software security hardening
  6. software transformation

Qualifiers

  • Abstract

Conference

CCS '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 93
    Total Downloads
  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)5
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media