메뉴 건너뛰기




Volumn , Issue , 2011, Pages 275-284

Deobfuscation of virtualization-obfuscated software: A semantics-based approach

Author keywords

Deobfuscation; Dynamic analysis; Virtualization

Indexed keywords

AUTOMATED ANALYSIS; BYTECODES; DEOBFUSCATION; MALICIOUS CODES; MALWARES; OBSERVABLE BEHAVIOR; PROTOTYPE TOOLS; REVERSE ENGINEERS; STATIC AND DYNAMIC ANALYSIS; VIRTUALIZATIONS;

EID: 80755169494     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046739     Document Type: Conference Paper
Times cited : (117)

References (17)
  • 1
    • 80755174275 scopus 로고    scopus 로고
    • VX Heavens, 2011. http://vx.netlux.org/.
    • (2011)
  • 4
    • 82055196630 scopus 로고    scopus 로고
    • Equational reasoning on x86 assembly code
    • IEEE International Workshop on
    • K. Coogan and S. Debray. Equational reasoning on x86 assembly code. Source Code Analysis and Manipulation, IEEE International Workshop on, 2011.
    • (2011) Source Code Analysis and Manipulation
    • Coogan, K.1    Debray, S.2
  • 10
    • 34548737161 scopus 로고    scopus 로고
    • Exploring multiple execution paths for malware analysis
    • DOI 10.1109/SP.2007.17, 4223228, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 231-245, 2007. (Pubitemid 47432530)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 231-245
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 14
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Tip, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.