메뉴 건너뛰기




Volumn 6879 LNCS, Issue , 2011, Pages 210-226

Linear obfuscation to combat symbolic execution

Author keywords

malware analysis; Software obfuscation; symbolic execution

Indexed keywords

CODES (SYMBOLS); DATA OBFUSCATION; MODEL CHECKING;

EID: 80052983876     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23822-2_12     Document Type: Conference Paper
Times cited : (46)

References (40)
  • 1
    • 47249130414 scopus 로고    scopus 로고
    • RWset: Attacking path explosion in constraint-based test generation
    • Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. Springer, Heidelberg
    • Boonstoppel, P., Cadar, C., Engler, D.: RWset: Attacking path explosion in constraint-based test generation. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 351-366. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4963 , pp. 351-366
    • Boonstoppel, P.1    Cadar, C.2    Engler, D.3
  • 16
    • 85165861995 scopus 로고    scopus 로고
    • Ferrie, P.: W32.Mydoom (2004), http://www.symantec.com/security-response/ writeup.jsp?docid=2004-012612-5422-99&tabid=2
    • (2004) W32.Mydoom
    • Ferrie, P.1
  • 17
    • 57049171932 scopus 로고    scopus 로고
    • BinHunt: Automatically finding semantic differences in binary programs
    • Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. Springer, Heidelberg
    • Gao, D., Reiter, M.K., Song, D.: BinHunt: Automatically finding semantic differences in binary programs. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 238-255. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5308 , pp. 238-255
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 21
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • King, J.C.: Symbolic execution and program testing. Commun. ACM 19, 385-394 (1976), http://doi.acm.org/10.1145/360248.360252
    • (1976) Commun. ACM , vol.19 , pp. 385-394
    • King, J.C.1
  • 22
    • 85165864249 scopus 로고    scopus 로고
    • Knowles, D., Perriott, F.: W32.Blaster (2003), http://www.symantec.com/ security-response/writeup.jsp?docid=2003-081113-0229-99&tabid=2
    • (2003) W32.Blaster
    • Knowles, D.1    Perriott, F.2
  • 23
    • 0002747273 scopus 로고
    • The 3x+1 problem and its generations
    • Lagarias, J.C.: The 3x+1 problem and its generations. Amer. Math. Monthly 92, 3-23 (1985)
    • (1985) Amer. Math. Monthly , vol.92 , pp. 3-23
    • Lagarias, J.C.1
  • 36
    • 85165837952 scopus 로고    scopus 로고
    • Shinotsuka, H.: W32.NetSky (2004), http://www.symantec.com/security- response/writeup.jsp?docid=2004-030717-4718-99&tabid=2
    • (2004) W32.NetSky
    • Shinotsuka, H.1
  • 37
    • 85165835637 scopus 로고    scopus 로고
    • Tech. rep., Electronics, Telecommunications, and Informatics Department, University of Aveiro November
    • Silva, T.O.: Computational verification of the 3x+1 conjecture. Tech. rep., Electronics, Telecommunications, and Informatics Department, University of Aveiro (November 2010), http://www.ieeta.pt/~tos/3x+1.html
    • (2010) Computational Verification of the 3x+1 Conjecture
    • Silva, T.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.