Abstract
Many existing techniques for reversing data structures in C/C ++ binaries are limited to low-level programming constructs, such as individual variables or structs. Unfortunately, without detailed information about a program's pointer structures, forensics and reverse engineering are exceedingly hard. To fill this gap, we propose MemPick, a tool that detects and classifies high-level data structures used in stripped binaries. By analyzing how links between memory objects evolve throughout the program execution, it distinguishes between many commonly used data structures, such as singly- or doubly-linked lists, many types of trees (e.g., AVL, red-black trees, B-trees), and graphs. We evaluate the technique on 10 real world applications, 4 file system implementations and 16 popular libraries. The results show that MemPick can identify the data structures with high accuracy.
Original language | English |
---|---|
Pages (from-to) | 778–810 |
Number of pages | 33 |
Journal | Empirical Software Engineering |
Volume | 21 |
Issue number | 3 |
Early online date | 7 Mar 2015 |
DOIs | |
Publication status | Published - Jun 2015 |