메뉴 건너뛰기




Volumn , Issue , 2004, Pages 17-28

Abstracting stack to detect obfuscated calls in binaries

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACT STACKS; DECOMPILATION; KERNEL FUNCTIONS; KERNEL LIBRARIES;

EID: 14344257909     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCAM.2004.2     Document Type: Conference Paper
Times cited : (21)

References (19)
  • 2
    • 84860082857 scopus 로고    scopus 로고
    • Last accessed July 1, 2004
    • "Z0mbie," http://z0mbie.host.sk, Last accessed July 1, 2004.
  • 4
    • 0011188089 scopus 로고    scopus 로고
    • On the Impossibility of Obfuscating Programs
    • Santa Barbara, California, USA
    • B. Barak, et al., "On the (Impossibility of Obfuscating Programs," in Advances in Cryptology (CRYPTO'01), Santa Barbara, California, USA, 2001.
    • (2001) Advances in Cryptology (CRYPTO'01)
    • Barak, B.1
  • 5
    • 14344257894 scopus 로고    scopus 로고
    • Last accessed July 1, 2004
    • S. Cho, "Win32 Disassembler," http://www.geocities.com/ ~sangcho/disasm.html, Last accessed July 1, 2004.
    • Win32 Disassembler
    • Cho, S.1
  • 8
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Transactions on Software Engineering, vol. 28, pp. 735-746, 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 10
    • 0000118661 scopus 로고
    • Abstract interpretation: A semantics-based tool for program analysis
    • S. Abramsky, et al., Eds. Oxford, UK: Oxford University Press
    • N. D. Jones and F. Nielson, "Abstract Interpretation: A Semantics-Based Tool for Program Analysis," in Handbook of Logic in Computer Science: Semantic Modelling, vol. 4, S. Abramsky, et al., Eds. Oxford, UK: Oxford University Press, 1995, pp. 527-636.
    • (1995) Handbook of Logic in Computer Science: Semantic Modelling , vol.4 , pp. 527-636
    • Jones, N.D.1    Nielson, F.2
  • 11
    • 85084160818 scopus 로고    scopus 로고
    • Static disassembly of obfuscated binaries
    • San Diego
    • C. Kruegel, et al., "Static Disassembly of Obfuscated Binaries," in USENIX Security 2004, San Diego, 2004.
    • (2004) USENIX Security 2004
    • Kruegel, C.1
  • 12
    • 11244339197 scopus 로고    scopus 로고
    • Challenges in getting formal with viruses
    • A. Lakhotia and P. K. Singh, "Challenges in Getting Formal with Viruses," Virus Bulletin, 2003, http://www.virusbtn.com/magazine/archives/ 200309/formal.xml.
    • (2003) Virus Bulletin
    • Lakhotia, A.1    Singh, P.K.2
  • 14
    • 18144398001 scopus 로고    scopus 로고
    • The Center for Advanced Computer Studies, University of Louisiana at Lafayette, M.S. Thesis
    • M. Mohammed, Zeroing in on Metamorphic Viruses, The Center for Advanced Computer Studies, University of Louisiana at Lafayette, M.S. Thesis, 2003.
    • (2003) Zeroing in on Metamorphic Viruses
    • Mohammed, M.1
  • 18
    • 84944602623 scopus 로고    scopus 로고
    • An experimentation framework for evaluating disassembly and decompilation tools for C++ and Java
    • L. Vinciguerra, et al., "An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java," in 10th Working Conference on Reverse Engineering, 2003.
    • (2003) 10th Working Conference on Reverse Engineering
    • Vinciguerra, L.1
  • 19
    • 11144229255 scopus 로고    scopus 로고
    • Institute of Engineering Cybernetics, Wroclaw University of Technology, PhD. Thesis
    • G. Wroblewski, General Method of Program Code Obfuscation, Institute of Engineering Cybernetics, Wroclaw University of Technology, PhD. Thesis, 2002.
    • (2002) General Method of Program Code Obfuscation
    • Wroblewski, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.