|'0-knowledge fuzzing', Black Hat DC 2010 Whitepaper written by Vincenzo Iozzo
This paper describes the algorithms and tools used for implementing a fuzzer that is able to perform smart fuzzing without prior knowledge of the input format.
|REIL: A platform-independent intermediate representation of disassembled code for static code analysis
In this paper published at CanSecWest 2009, we describe the Reverse Engineering Intermediate Language REIL which is used to implement platform-independent static code analysis algorithms in our BinNavi environment.
|Using BinDiff 1.6 for malware analysis
A short and easy-to-read whitepaper describing the use of zynamics BinDiff in porting the analysis results of a disassembly of Bagle/W to a disassembly of Bagle/X.
|Graph-based comparison of Executable Objects
Comparing Executable Objects, published as part of the proceedings of SSTIC'05. For the more mathematically inclined reader. AWARDED BEST PAPER.
|Structural Comparison of Executable Objects
Structural Comparison of Executable Objects published at DIMVA 2004, available in the conference proceedings published in the LNI series.