Publication | Open Access
Avatar<sup>2</sup>: A Multi-Target Orchestration Platform
92
Citations
18
References
2018
Year
Unknown Venue
Dynamic binary analysis techniques play a central role to study the security of software systems and detect vulnerabilities in a broad range of devices and applications. Over the past decade, a variety of different techniques have been published, often alongside the release of prototype tools to demonstrate their effectiveness. Unfortunately, most of those techniques' implementations are deeply coupled with their dynamic analysis frameworks and are not easy to integrate in other frameworks. Those frameworks are not designed to expose their internal state or their results to other components. This prevents analysts from being able to combine together different tools to exploit their strengths and tackle complex problems which requires a combination of sophisticated techniques. Fragmentation and isolation are two important problems which too often results in duplicated efforts or in multiple equivalent solutions for the same problem -each based on a different programming language, abstraction model, or execution environment.
| Year | Citations | |
|---|---|---|
Page 1
Page 1