메뉴 건너뛰기




Volumn 5230 LNCS, Issue , 2008, Pages 98-115

A study of the packer problem and its solutions

Author keywords

[No Author keywords available]

Indexed keywords

COMPREHENSIVE STUDIES; EXECUTION SEMANTICS; JUST IN TIMES; MALWARE; MALWARE DETECTIONS; PROBLEM BASED; PROCESS IMAGES; STACK POINTERS; SYMANTEC;

EID: 56549090955     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-87403-4_6     Document Type: Conference Paper
Times cited : (116)

References (20)
  • 2
    • 56549109366 scopus 로고    scopus 로고
    • ASPACK SOFTWARE
    • ASPACK SOFTWARE, ASPack for Windows, (2007), http://www.aspack.com/ aspack.html
    • (2007) ASPack for Windows
  • 3
    • 56549114507 scopus 로고    scopus 로고
    • bart, FSG: [F]ast [S]mall [G]ood exe packer, (2005), http://www.xtreeme. prv.pl/
    • bart, FSG: [F]ast [S]mall [G]ood exe packer, (2005), http://www.xtreeme. prv.pl/
  • 7
  • 9
    • 56549083858 scopus 로고    scopus 로고
    • VMProtect, VMProtect (2008), http://www.vmprotect.ru/
    • (2008) VMProtect
  • 10
    • 56549119233 scopus 로고    scopus 로고
    • Symantec Corporation
    • Symantec Corporation (2008), http://www.syrnantec.com/
    • (2008)
  • 11
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Security and Privacy 5(2), 40-45 (2007)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 17
    • 56549105621 scopus 로고    scopus 로고
    • Quist, D., Valsmith,: Covert Debugging: Circumventing Software Armoring. In: Proceedings of Black Hat USA (2007)
    • Quist, D., Valsmith,: Covert Debugging: Circumventing Software Armoring. In: Proceedings of Black Hat USA (2007)
  • 20
    • 56549090368 scopus 로고    scopus 로고
    • NX bit, http://en.wikipedia.org/wiki/NX_bit
    • NX bit


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.