@article { author = {Letychevskyi, Oleksandr and Hryniuk, Yaroslav and Yakovlev, Viktor and Peschanenko, Volodymyr and Radchenko, Viktor}, title = {Algebraic Matching of Vulnerabilities in a Low-Level Code}, journal = {The ISC International Journal of Information Security}, volume = {11}, number = {3}, pages = {1-7}, year = {2019}, publisher = {Iranian Society of Cryptology}, issn = {2008-2045}, eissn = {2008-3076}, doi = {10.22042/isecure.2019.11.0.1}, abstract = {This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques with usage of conditional rewriting. This process is combined with symbolic modeling that gives a possibility to provide accurate detection of vulnerabilities. The paper provides examples of formalization of vulnerability models and translation of binary codes to behavior algebra expressions.}, keywords = {Algebraic Matching,Symbolic Modeling,Behavior Algebra,Rewriting Rules,Vulnerability Detection}, url = {https://www.isecure-journal.com/article_90271.html}, eprint = {https://www.isecure-journal.com/article_90271_38c3698ac8b2da14fc68aeb5f92d73a6.pdf} }