-
1
-
-
0004072686
-
-
Addison Wesley
-
A. Aho, M. Lam, R. Sethi, and J. Ullman. Compilers- Principles, Techniques, & Tools. Addison Wesley, 2006.
-
(2006)
Compilers-Principles Techniques & Tools
-
-
Aho, A.1
Lam, M.2
Sethi, R.3
Ullman, J.4
-
2
-
-
84869673250
-
-
Last accessed Mar. 6
-
Avira Antivirus. http://www.free-av.com. Last accessed Mar. 6, 2009.
-
(2009)
Avira Antivirus
-
-
-
4
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2003.
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
8
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the ACM Symposium on Principles of Programming Languages (POPL), 1998.
-
(1998)
Proceedings of the ACM Symposium on Principles of Programming Languages (POPL)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
0036450418
-
Reverse execution of Java bytecode
-
J. J. Cook. Reverse execution of Java bytecode. The Computer Journal, 45(6), 2002.
-
(2002)
The Computer Journal
, vol.45
, Issue.6
-
-
Cook, J.J.1
-
10
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
W. Cui, M. Peinado, K. Chen, H. Wang, and L. Irun-Briz. Tupni: Automatic reverse engineering of input formats. In Proceedings of the ACM Conference on Computer and Communications Security, 2008.
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.4
Irun-Briz, L.5
-
20
-
-
48649084773
-
OmniUnpack: Fast, generic, and safe unpacking of malware
-
L. Martignoni, M. Christodorescu, and S. Jha. OmniUnpack: Fast, generic, and safe unpacking of malware. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2007.
-
(2007)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
22
-
-
84869676029
-
-
Last accessed Mar. 6
-
Oreans Technologies. http://www.oreans.com/. Last accessed Mar. 6, 2009.
-
(2009)
Oreans Technologies
-
-
-
23
-
-
84869670986
-
-
Last accessed Mar. 6
-
Oreans Technologies: Code Virtualizer. http://www.oreans.com/ codevirtualizer.php. Last accessed Mar. 6, 2009.
-
(2009)
Oreans Technologies: Code Virtualizer
-
-
-
24
-
-
84869684879
-
-
Last accessed Mar. 6
-
Oreans Technologies: Themida. http://www.oreans.com/. Last accessed Mar. 6, 2009.
-
(2009)
Oreans Technologies: Themida
-
-
-
27
-
-
34748820878
-
PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the hidden-code extraction of unpack-executing malware. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
28
-
-
70449649114
-
Rotaluḿe: A tool for automatically reverse engineering malware emulators
-
Georgia Institute of Technology
-
M. Sharif, A. Lanzi, J. Giffin, and W. Lee. Rotaluḿe: A tool for automatically reverse engineering malware emulators. Technical Report GT-CS-09-105, School of Computer Science, Georgia Institute of Technology, 2009. http://www.cc.gatech.edu/research/reports/GT-CS-09-05.pdf.
-
(2009)
Technical Report GT-CS-09-105, School of Computer Science
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
-
30
-
-
0002254859
-
Binary translation
-
Feb.
-
R. L. Sites, A. Chernoff, M. B. Kerk, M. P. Marks, and S. G. Robinson. Binary translation. Communication of the ACM, 36(2), Feb. 1993.
-
(1993)
Communication of the ACM
, vol.36
, Issue.2
-
-
Sites, R.L.1
Chernoff, A.2
Kerk, M.B.3
Marks, M.P.4
Robinson, S.G.5
-
34
-
-
84869669864
-
-
Last accessed Mar. 6
-
Virus Total. http://www.virustotal.com/. Last accessed Mar. 6, 2009.
-
(2009)
Virus Total
-
-
-
35
-
-
84869682660
-
-
Last accessed Mar. 6
-
VMPsoft VMProtect. http://www.vmprotect.ru/. Last accessed Mar. 6, 2009.
-
(2009)
VMPsoft VMProtect
-
-
-
38
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|