-
2
-
-
33947148483
-
z0mbie
-
Nov
-
"z0mbie," http://z0mbie.host.sk, Nov. 2004.
-
(2004)
-
-
-
4
-
-
0011188089
-
On the (Im)Possibility of Obfuscating Programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (Im)Possibility of Obfuscating Programs," Proc. Conf. Advances in Cryptology (CRYPTO '01), 2001.
-
(2001)
Proc. Conf. Advances in Cryptology (CRYPTO '01)
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
6
-
-
14344257894
-
-
Nov
-
S. Cho, "Win32 Disassembler," http://www.geocities.com/sangcho/ disasm.html, Nov. 2004.
-
(2004)
Win32 Disassembler
-
-
Cho, S.1
-
7
-
-
27544433210
-
Semantics-Aware Malware Detection
-
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant, "Semantics-Aware Malware Detection," Proc. IEEE Symp. Security and Privacy, 2005.
-
(2005)
Proc. IEEE Symp. Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
10
-
-
0024682488
-
Computational Aspects of Computer Viruses
-
F. Cohen, "Computational Aspects of Computer Viruses," Computers and Security, vol. 8, pp. 325-344, 1989.
-
(1989)
Computers and Security
, vol.8
, pp. 325-344
-
-
Cohen, F.1
-
11
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
-
C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection," IEEE Trans. Software Eng., vol. 28, pp. 735-746, 2002.
-
(2002)
IEEE Trans. Software Eng
, vol.28
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
12
-
-
0004046658
-
A Taxonomy of Obfuscating Transformations
-
Dept. of Computer Science, The University of Auckland 148, July
-
C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscating Transformations," technical report, Dept. of Computer Science, The University of Auckland 148, July 1997.
-
(1997)
technical report
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
15
-
-
85084160818
-
Static Disassembly of Obfuscated Binaries
-
C. Kruegel, W. Robertson, F. Valeur, and G. Vigna, "Static Disassembly of Obfuscated Binaries," Proc. USENIX Security Conf., 2004.
-
(2004)
Proc. USENIX Security Conf
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
16
-
-
33947188936
-
Phylogeny Using Maximal pi-Patterns
-
A. Lakhotia, M.E. Karim, A. Walenstein, and L. Parida, "Phylogeny Using Maximal pi-Patterns," Proc. 14th EICAR Conf., 2005.
-
(2005)
Proc. 14th EICAR Conf
-
-
Lakhotia, A.1
Karim, M.E.2
Walenstein, A.3
Parida, L.4
-
18
-
-
11244339197
-
Challenges in Getting Formal with Viruses
-
A. Lakhotia and P.K. Singh, "Challenges in Getting Formal with Viruses," Virus Bull., pp. 14-18, 2003.
-
(2003)
Virus Bull
, pp. 14-18
-
-
Lakhotia, A.1
Singh, P.K.2
-
20
-
-
0030736223
-
Computer Virus-Antivirus Coevolution
-
C. Nachenberg, "Computer Virus-Antivirus Coevolution," Comm. ACM, vol. 40, pp. 46-51, 1997.
-
(1997)
Comm. ACM
, vol.40
, pp. 46-51
-
-
Nachenberg, C.1
-
25
-
-
33947129527
-
Analyzing Memory Accesses in Obfuscated x86 Executables
-
M. Venable, M. Chouchane, M.E. Karim, and A. Lakhotia, "Analyzing Memory Accesses in Obfuscated x86 Executables," Proc. Conf. Detection of Intrusions and Mahvare and VuInerability Assessment, 2005.
-
(2005)
Proc. Conf. Detection of Intrusions and Mahvare and VuInerability Assessment
-
-
Venable, M.1
Chouchane, M.2
Karim, M.E.3
Lakhotia, A.4
-
26
-
-
84944602623
-
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java
-
L. Vinciguerra, L. Wills, N. Kejriwal, P. Martino, and R. Vinciguerra, "An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java," Proc. 10th Working Conf. Reverse Eng., 2003.
-
(2003)
Proc. 10th Working Conf. Reverse Eng
-
-
Vinciguerra, L.1
Wills, L.2
Kejriwal, N.3
Martino, P.4
Vinciguerra, R.5
-
27
-
-
11144229255
-
-
technical report, Inst. of Eng. Cybernetics, Wroclaw Univ. of Technology
-
G. Wroblewski, "General Method of Program Code Obfuscation," technical report, Inst. of Eng. Cybernetics, Wroclaw Univ. of Technology, 2002.
-
(2002)
General Method of Program Code Obfuscation
-
-
Wroblewski, G.1
|