TY - BOOK
T1 - Software Analysis Through Binary Function Identification
AU - Patrick-Evans, James
PY - 2022
Y1 - 2022
N2 - I wish to start by expressing my gratitude to my supervisor Johannes Kinder whose guidance and mentorship has been essential to the completion of my PhD. I would like to thank him not only for years of in-depth technical discussions but for being joyous and willingness to debate solutions to difficult research problems. I am especially grateful to both JohannesKinder and my advisor Lorenzo Cavallaro for their wisdom, time, and good company they gave to me. It has been a wonderful journey and without their expert knowledge in very specific fields of research, this PhD would not have been achieved.I would like to thank my lab colleagues for their continuous insightful input into our research group. In particular, I would like to thank Duncan Mitchell, Claudio Rizzo, and Blake Loring for their support and cheerful banter throughout this time. I would like to thank Hernán Ponce for proof reading sections of this thesis and Moritz Dannehl for his discourse andcollaboration in our work on XFL. I am grateful to everyone at the Centre for Doctoral training (CDT) in Cyber Security at Royal Holloway who have supported me and gave me a comprehension into a vast number of intricate research topics. I’m especially thankful of the CDT for supporting my excursions around globe to present and discuss my research with world leading experts and visit spectacular locations. Most importantly, I thank all CDT members for their companionship and conviviality who made this period so enjoyable. Appreciation also needs to be given to my colleagues at Kings College London and Universität der Bündeswehr München for their continuous support and good spirits.Finally, I would like to thank my mother for all the sacrifices she made during my childhood in striving for the betterment of my education, without which, I would most certainly never have embarked on a PhD.
AB - I wish to start by expressing my gratitude to my supervisor Johannes Kinder whose guidance and mentorship has been essential to the completion of my PhD. I would like to thank him not only for years of in-depth technical discussions but for being joyous and willingness to debate solutions to difficult research problems. I am especially grateful to both JohannesKinder and my advisor Lorenzo Cavallaro for their wisdom, time, and good company they gave to me. It has been a wonderful journey and without their expert knowledge in very specific fields of research, this PhD would not have been achieved.I would like to thank my lab colleagues for their continuous insightful input into our research group. In particular, I would like to thank Duncan Mitchell, Claudio Rizzo, and Blake Loring for their support and cheerful banter throughout this time. I would like to thank Hernán Ponce for proof reading sections of this thesis and Moritz Dannehl for his discourse andcollaboration in our work on XFL. I am grateful to everyone at the Centre for Doctoral training (CDT) in Cyber Security at Royal Holloway who have supported me and gave me a comprehension into a vast number of intricate research topics. I’m especially thankful of the CDT for supporting my excursions around globe to present and discuss my research with world leading experts and visit spectacular locations. Most importantly, I thank all CDT members for their companionship and conviviality who made this period so enjoyable. Appreciation also needs to be given to my colleagues at Kings College London and Universität der Bündeswehr München for their continuous support and good spirits.Finally, I would like to thank my mother for all the sacrifices she made during my childhood in striving for the betterment of my education, without which, I would most certainly never have embarked on a PhD.
M3 - Doctoral Thesis
ER -