Document Type
MS Project Report
Publication Date
2019-12-04
Embargo Period
12-26-2019
Abstract
Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released open-source in April 2019 and is capable of lifting instructions from a wide variety of processor architectures into its own register transfer language called p-code. In this project, we present a new tool which leverages Ghidra’s specific architecture-neutral intermediate representation to construct a control flow graph modeling all program executions of a given binary and apply static taint analysis. This technique is capable of identifying the information flow of malicious input from untrusted sources that may interact with key sinks or parts of the system without needing access to the source code itself and can be retargetable to analyze the behavior of a given program across many different processors.
Recommended Citation
Cole, Elaine, "Static Taint Analysis of Binary Executables Using Architecture-Neutral Intermediate Representation" Report Number: (2019). All Computer Science and Engineering Research.
https://openscholarship.wustl.edu/cse_research/1177