Zhou K.,Shanghai JiaoTong University |
Zhou K.,Shanghai Key Laboratory of Scalable Computing and System |
Huang S.,Shanghai JiaoTong University |
Huang S.,Shanghai Key Laboratory of Scalable Computing and System |
And 4 more authors.
China Communications | Year: 2010
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.