-
2
-
-
84860082857
-
-
Last accessed July 1, 2004
-
"Z0mbie," http://z0mbie.host.sk, Last accessed July 1, 2004.
-
-
-
-
4
-
-
0011188089
-
On the Impossibility of Obfuscating Programs
-
Santa Barbara, California, USA
-
B. Barak, et al., "On the (Impossibility of Obfuscating Programs," in Advances in Cryptology (CRYPTO'01), Santa Barbara, California, USA, 2001.
-
(2001)
Advances in Cryptology (CRYPTO'01)
-
-
Barak, B.1
-
5
-
-
14344257894
-
-
Last accessed July 1, 2004
-
S. Cho, "Win32 Disassembler," http://www.geocities.com/ ~sangcho/disasm.html, Last accessed July 1, 2004.
-
Win32 Disassembler
-
-
Cho, S.1
-
8
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Transactions on Software Engineering, vol. 28, pp. 735-746, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
9
-
-
0004046658
-
-
Department of Computer Science, The University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscating Transformations," Department of Computer Science, The University of Auckland, 148, July 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
0000118661
-
Abstract interpretation: A semantics-based tool for program analysis
-
S. Abramsky, et al., Eds. Oxford, UK: Oxford University Press
-
N. D. Jones and F. Nielson, "Abstract Interpretation: A Semantics-Based Tool for Program Analysis," in Handbook of Logic in Computer Science: Semantic Modelling, vol. 4, S. Abramsky, et al., Eds. Oxford, UK: Oxford University Press, 1995, pp. 527-636.
-
(1995)
Handbook of Logic in Computer Science: Semantic Modelling
, vol.4
, pp. 527-636
-
-
Jones, N.D.1
Nielson, F.2
-
11
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
San Diego
-
C. Kruegel, et al., "Static Disassembly of Obfuscated Binaries," in USENIX Security 2004, San Diego, 2004.
-
(2004)
USENIX Security 2004
-
-
Kruegel, C.1
-
12
-
-
11244339197
-
Challenges in getting formal with viruses
-
A. Lakhotia and P. K. Singh, "Challenges in Getting Formal with Viruses," Virus Bulletin, 2003, http://www.virusbtn.com/magazine/archives/ 200309/formal.xml.
-
(2003)
Virus Bulletin
-
-
Lakhotia, A.1
Singh, P.K.2
-
14
-
-
18144398001
-
-
The Center for Advanced Computer Studies, University of Louisiana at Lafayette, M.S. Thesis
-
M. Mohammed, Zeroing in on Metamorphic Viruses, The Center for Advanced Computer Studies, University of Louisiana at Lafayette, M.S. Thesis, 2003.
-
(2003)
Zeroing in on Metamorphic Viruses
-
-
Mohammed, M.1
-
15
-
-
79958700553
-
Disassembly of executable code revisited
-
Richmond, Virginia
-
B. Schwarz, S. Debray, and G. Andrews, "Disassembly of Executable Code Revisited," in Ninth Working Conference on Reverse Engineering (WCRE'02), Richmond, Virginia, 2002.
-
(2002)
Ninth Working Conference on Reverse Engineering (WCRE'02)
-
-
Schwarz, B.1
Debray, S.2
Andrews, G.3
-
18
-
-
84944602623
-
An experimentation framework for evaluating disassembly and decompilation tools for C++ and Java
-
L. Vinciguerra, et al., "An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java," in 10th Working Conference on Reverse Engineering, 2003.
-
(2003)
10th Working Conference on Reverse Engineering
-
-
Vinciguerra, L.1
-
19
-
-
11144229255
-
-
Institute of Engineering Cybernetics, Wroclaw University of Technology, PhD. Thesis
-
G. Wroblewski, General Method of Program Code Obfuscation, Institute of Engineering Cybernetics, Wroclaw University of Technology, PhD. Thesis, 2002.
-
(2002)
General Method of Program Code Obfuscation
-
-
Wroblewski, G.1
|