-
1
-
-
0004072686
-
-
Addison-Wesley Reading, MA
-
Aho A.V., Sethi R. and Ullman J.D. (1986). Compilers: Principles, Techniques and, Tools. Addison-Wesley, Reading, MA
-
(1986)
Compilers: Principles, Techniques And, Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
2
-
-
70350618351
-
On the possibility of practically obfuscating programs-towards a unifed perspective of code protection
-
WTCV'06 Special Issue, Bonfante, G., Marion, J.-Y. eds
-
Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating programs-towards a unifed perspective of code protection. J. Comput. Virol. (WTCV'06 Special Issue, Bonfante, G., Marion, J.-Y. eds), 2(4) (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.4
-
-
Beaucamps, P.1
Filiol, E.2
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Crypto '01
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Crypto '01, LNCS No.2139, pp. 1-18 (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
Springer Berlin
-
Bruschi D., Martignoni L. and Monga M. (2006). Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R. and Laskov, P. (eds) Detection of Intrusions and Malware & Vulnerability Assessment, volume 4064 of LNCS, pp 129-143. Springer, Berlin
-
(2006)
Detection of Intrusions and Malware & Vulnerability Assessment, Volume 4064 of LNCS
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
Büschkes, R.4
Laskov, P.5
-
5
-
-
34047166855
-
Using code normalization for fighting self-mutating malware
-
IEEE Computer Society, Arlington
-
Bruschi, D., Martignoni, L., Monga, M.: Using code normalization for fighting self-mutating malware. In: Proceedings of the International Symposium of Secure Software Engineering. IEEE Computer Society, Arlington (2006)
-
(2006)
Proceedings of the International Symposium of Secure Software Engineering
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
6
-
-
84947229190
-
An approach to the obfuscation of control-flow of sequential computer programs
-
Springer, London
-
Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An approach to the obfuscation of control-flow of sequential computer programs. In: ISC '01: Proceedings of the 4th International Conference on Information Security, pp. 144-155. Springer, London (2001)
-
(2001)
ISC '01: Proceedings of the 4th International Conference on Information Security
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.A.4
-
7
-
-
0004148980
-
-
Ph.D. thesis, Queensland University of Technology, School of Computing Science
-
Cifuentes, C.: Reverse Compilation Techniques. Ph.D. thesis, Queensland University of Technology, School of Computing Science (1994)
-
(1994)
Reverse Compilation Techniques
-
-
Cifuentes, C.1
-
11
-
-
0004046658
-
-
Technical Report 148, Univerity of Auckland, New Zealand
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Univerity of Auckland, New Zealand (1997)
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
12
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Principles of Programming Languages 1998, POPL'98, pp. 184-196 (1998)
-
(1998)
Principles of Programming Languages 1998, POPL'98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
15
-
-
33748978409
-
Malware pattern scanning schemes secure against black-box analysis
-
EICAR 2006 Special Issue, Broucek, V., Tuner, P. eds
-
Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. J. Comput. Virol. (EICAR 2006 Special Issue, Broucek, V., Tuner, P. eds), 2(1) (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.1
-
-
Filiol, E.1
-
16
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
-
TCV 2006 Special Issue, Bonfante, G., Marion, J.-Y. eds
-
Jacob, G., Filiol, E., Le Liard, M.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol. (TCV 2006 Special Issue, Bonfante, G., Marion, J.-Y. eds), 3(1) (2007)
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.1
-
-
Jacob, G.1
Filiol, E.2
Le Liard, M.3
-
19
-
-
0344559685
-
Softwate tamper resitance based on the difficulty of interprocdeural analysis
-
Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Softwate tamper resitance based on the difficulty of interprocdeural analysis. In: The Third International Workshop on Information Security Applications, pp. 437-452 (2002)
-
(2002)
The Third International Workshop on Information Security Applications
, pp. 437-452
-
-
Ogiso, T.1
Sakabe, Y.2
Soshi, M.3
Miyaji, A.4
-
20
-
-
34548223126
-
A semantics-based approach to malware detection
-
January 17-19, 2007. ACM Press, New York
-
Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. In: Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'07), pp. 377-388, January 17-19, 2007. ACM Press, New York (2007)
-
(2007)
Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'07)
, pp. 377-388
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
21
-
-
33749908081
-
Classes of recurively enumerable sets and their decision problems
-
Rice, H.G.: Classes of recurively enumerable sets and their decision problems. Transactions of the American Mathematical Society, pp. 358-366 (1953)
-
(1953)
Transactions of the American Mathematical Society
, pp. 358-366
-
-
Rice, H.G.1
-
23
-
-
0037269111
-
Reliable identification of bounded-length viruses is np-complete
-
1
-
Spinellis D. (2003). Reliable identification of bounded-length viruses is np-complete. IEEE Trans. Inform. Theory 49(1): 280-284
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 280-284
-
-
Spinellis, D.1
-
24
-
-
21644475665
-
Static analyzer of vicious executables(save)
-
IEEE
-
Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables(save). In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04). IEEE (2004)
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04)
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
26
-
-
0012037951
-
-
Technical Report CS-2000-12, University of Virginia
-
Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia (2000)
-
(2000)
Software Tamper Resistance: Obstructing Static Analysis of Programs
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
27
-
-
34547197548
-
Normalizing metamorphic malware using term rewriting
-
Walenstein, A., Mathur, R., Chouchane, M.R., Lakhotia, A.: Normalizing metamorphic malware using term rewriting. SCAM 2006: The 6th IEEE Workshop Source Code Analysis and Manipulation, pp. 75-84 (2006)
-
(2006)
SCAM 2006: The 6th IEEE Workshop Source Code Analysis and Manipulation
, pp. 75-84
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
|