-
3
-
-
36448946902
-
Visual exploration of function call graphs for feature location in complex software systems
-
New York, NY, USA, ACM
-
J. Bohnet and J. Döllner. Visual exploration of function call graphs for feature location in complex software systems. In SoftVis '06: Proceedings of the 2006 ACM symposium on Software visualization, pages 95-104, New York, NY, USA, 2006. ACM.
-
(2006)
SoftVis '06: Proceedings of the 2006 ACM symposium on Software visualization
, pp. 95-104
-
-
Bohnet, J.1
Döllner, J.2
-
4
-
-
0034770594
-
Computer security analysis through decompilation and high-level debugging
-
IEEE Computer Society Washington, DC, USA
-
C. Cifuentes, T. Waddington, and M. V. Emmerik. Computer security analysis through decompilation and high-level debugging. In Eighth Working Conference on Reverse Engineering. IEEE Computer Society Washington, DC, USA, 2001.
-
(2001)
Eighth Working Conference on Reverse Engineering
-
-
Cifuentes, C.1
Waddington, T.2
Emmerik, M.V.3
-
7
-
-
77949370639
-
-
P. Ferrie. Anti-unpacker tricks - part one. Virus Bulletin, 2008.
-
P. Ferrie. Anti-unpacker tricks - part one. Virus Bulletin, 2008.
-
-
-
-
8
-
-
77949455259
-
A study of the packer and its solutions
-
Cambridge, Massachusettes
-
F. Guo, P. Ferrie, and T.-c. Chiueh. A study of the packer and its solutions. In RAID, Cambridge, Massachusettes.
-
RAID
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.-C.3
-
9
-
-
77949344936
-
Advanced software armoring and polymorphic kung-fu
-
Aug
-
N. Harbour. Advanced software armoring and polymorphic kung-fu. In Defcon 16, Aug. 2008.
-
(2008)
Defcon
, vol.16
-
-
Harbour, N.1
-
10
-
-
77949398847
-
Responder professional
-
HBGary. Responder professional. Product Description Page. https://www.hbgary.com/products-services/ responder-professional/.
-
Product Description Page
-
-
-
13
-
-
34547448056
-
Finding diversity in remote code injection exploits
-
Rio de Janeiro, Brazil, ACM
-
J. Ma, J. Dunagan, H. J.Wang, S. Savage, and G. M. Voelker. Finding diversity in remote code injection exploits. In Internet Measurement Conference, Rio de Janeiro, Brazil, 2006. ACM.
-
(2006)
Internet Measurement Conference
-
-
Ma, J.1
Dunagan, J.2
Wang, H.J.3
Savage, S.4
Voelker, G.M.5
-
15
-
-
57949115209
-
Covert debugging: Circumventing software armoring
-
Aug
-
D. Quist and V. Smith. Covert debugging: Circumventing software armoring. In Blackhat USA, Aug. 2007.
-
(2007)
Blackhat USA
-
-
Quist, D.1
Smith, V.2
-
16
-
-
77950142581
-
Alternative medicine: The malware analyst's blue pill
-
Aug
-
P. Royal. Alternative medicine: The malware analyst's blue pill. In Blackhat USA, Aug. 2008.
-
(2008)
Blackhat USA
-
-
Royal, P.1
-
17
-
-
77949353766
-
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, andW. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware, 2006.
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, andW. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware, 2006.
-
-
-
-
18
-
-
80053624333
-
Ollybone: Semi-automatic unpacking on ia-32
-
Las Vegas, NV
-
J. Stewart. Ollybone: Semi-automatic unpacking on ia-32. In Defcon 14, Las Vegas, NV, 2006.
-
(2006)
Defcon 14
-
-
Stewart, J.1
-
19
-
-
63449083987
-
An interactive reverse engineering environment for large-scale c++ code
-
New York, NY, USA, ACM
-
A. Telea and L. Voinea. An interactive reverse engineering environment for large-scale c++ code. In SoftVis '08: Proceedings of the 4th ACM symposium on Software visualization, pages 67-76, New York, NY, USA, 2008. ACM.
-
(2008)
SoftVis '08: Proceedings of the 4th ACM symposium on Software visualization
, pp. 67-76
-
-
Telea, A.1
Voinea, L.2
-
20
-
-
77949395634
-
-
Hobart, Tasmania, Australia, January, Australian Computer Society, Inc
-
A. Vasudevan and R. Yerraballi. Spike: Engineering malware analysis tools using unobtrusive binary-instrumentation. volume 48, Hobart, Tasmania, Australia, January 2006. Australian Computer Society, Inc.
-
(2006)
Spike: Engineering malware analysis tools using unobtrusive binary-instrumentation
, vol.48
-
-
Vasudevan, A.1
Yerraballi, R.2
-
21
-
-
56449096775
-
Visual analysis of program flow data with data propagation
-
Berlin, Heidelberg, Springer-Verlag
-
Y. Xia, K. Fairbanks, and H. Owen. Visual analysis of program flow data with data propagation. In VizSec '08: Proceedings of the 5th international workshop on Visualization for Computer Security, pages 26-35, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
VizSec '08: Proceedings of the 5th international workshop on Visualization for Computer Security
, pp. 26-35
-
-
Xia, Y.1
Fairbanks, K.2
Owen, H.3
-
23
-
-
77949375517
-
-
Company Product Description Page. http
-
Zynamics. Binnavi. Company Product Description Page. http: //www.zynamics.com/binnavi.html.
-
Binnavi
-
-
|