-
1
-
-
84893250825
-
-
Gdb. http://www.gnu.org/software/gdb/.
-
Gdb
-
-
-
2
-
-
84893246620
-
-
Ida pro. http://www.hex-rays.com/idapro/.
-
Ida Pro
-
-
-
3
-
-
84893240599
-
-
Kvm. http://www.linux-kvm.org/.
-
-
-
-
5
-
-
4444265683
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. SOSP'03.
-
SOSP'03
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
84880262565
-
Qemu, a fast and portable dynamic translator
-
F. Bellard. Qemu, a fast and portable dynamic translator. In USENIX ATC'05.
-
USENIX ATC'05
-
-
Bellard, F.1
-
8
-
-
85085845545
-
Framework for instruction-level tracing and analysis of program executions
-
S. Bhansali, W.-K. Chen, S. De Jong, A. Edwards, R. Murray, M. Drinić, D. Mihočka, and J. Chau. Framework for instruction-level tracing and analysis of program executions. In VEE'06.
-
VEE'06
-
-
Bhansali, S.1
Chen, W.-K.2
De Jong, S.3
Edwards, A.4
Murray, R.5
Drinić, M.6
Mihočka, D.7
Chau, J.8
-
12
-
-
35448973319
-
Pinos: A programmable framework for whole-system dynamic instrumentation
-
P. P. Bungale and C.-K. Luk. Pinos: a programmable framework for whole-system dynamic instrumentation. In VEE'07.
-
VEE'07
-
-
Bungale, P.P.1
Luk, C.-K.2
-
13
-
-
84893222248
-
Introlib: Efficient and transparent library call introspection for malware forensics
-
Z. Deng, D. Xu, X. Zhang, and X. Jiang. Introlib: Efficient and transparent library call introspection for malware forensics. In DFRWS'12.
-
DFRWS'12
-
-
Deng, Z.1
Xu, D.2
Zhang, X.3
Jiang, X.4
-
14
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In CCS'08.
-
CCS'08
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
15
-
-
84858785132
-
Comprehensive kernel instrumentation via dynamic binary translation
-
P. Feiner, A. D. Brown, and A. Goel. Comprehensive kernel instrumentation via dynamic binary translation. In ASPLOS'12.
-
ASPLOS'12
-
-
Feiner, P.1
Brown, A.D.2
Goel, A.3
-
18
-
-
33845406801
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS'03.
-
NDSS'03
-
-
Garfinkel, T.1
Rosenblum, M.2
-
19
-
-
84893265779
-
Transparent protection of commodity os kernels using hardware virtualization
-
M. Grace, Z. Wang, D. Srinivasan, J. Li, X. Jiang, Z. Liang, and S. Liakh. Transparent protection of commodity os kernels using hardware virtualization. In SecureComm'10.
-
SecureComm'10
-
-
Grace, M.1
Wang, Z.2
Srinivasan, D.3
Li, J.4
Jiang, X.5
Liang, Z.6
Liakh, S.7
-
20
-
-
77949455259
-
A study of the packer problem and its solutions
-
F. Guo, P. Ferrie, and T.-C. Chiueh. A study of the packer problem and its solutions. In RAID'08.
-
RAID'08
-
-
Guo, F.1
Ferrie, P.2
Chiueh, T.-C.3
-
24
-
-
33745949864
-
Bochs: A portable pc emulator for unix/x
-
K. P. Lawton. Bochs: A portable pc emulator for unix/x. Linux Journal, 1996.
-
(1996)
Linux Journal
-
-
Lawton, K.P.1
-
25
-
-
84961349074
-
High accuracy attack provenance via binary-based execution partition
-
K. H. Lee, X. Zhang, and D. Xu. High accuracy attack provenance via binary-based execution partition. In NDSS'13.
-
NDSS'13
-
-
Lee, K.H.1
Zhang, X.2
Xu, D.3
-
26
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI'05.
-
PLDI'05
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
28
-
-
77950831023
-
Mavmm: Lightweight and purpose built vmm for malware analysis
-
A. Nguyen, N. Schear, H. Jung, A. Godiyal, S. King, and H. Nguyen. Mavmm: Lightweight and purpose built vmm for malware analysis. In ACSAC'09.
-
ACSAC'09
-
-
Nguyen, A.1
Schear, N.2
Jung, H.3
Godiyal, A.4
King, S.5
Nguyen, H.6
-
30
-
-
84893301706
-
Dynamic binary instrumentation frameworks: I know you're there spying on me
-
N. Riva and F. Falćon. Dynamic binary instrumentation frameworks: I know you're there spying on me. REcon'12.
-
REcon'12
-
-
Riva, N.1
Falćon, F.2
-
32
-
-
84943385283
-
Retargetable and reconfigurable software dynamic translation
-
K. Scott, N. Kumar, S. Velusamy, B. Childers, J. Davidson, and M. Soffa. Retargetable and reconfigurable software dynamic translation. In CGO'03.
-
CGO'03
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.4
Davidson, J.5
Soffa, M.6
-
33
-
-
70449684394
-
Bitblaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. Bitblaze: A new approach to computer security via binary analysis. In ICISS'08.
-
ICISS'08
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
34
-
-
77951466505
-
Re-inforced stealth breakpoints
-
A. Vasudevan. Re-inforced stealth breakpoints. In CRiSIS'09.
-
CRiSIS'09
-
-
Vasudevan, A.1
-
35
-
-
84893313046
-
Cobra: Fine-grained malware analysis using stealth localized-executions
-
A. Vasudevan and R. Yerraballi. Cobra: Fine-grained malware analysis using stealth localized-executions. In IEEE S&P'06.
-
IEEE S&P'06
-
-
Vasudevan, A.1
Yerraballi, R.2
-
37
-
-
84893234102
-
Using hardware performance events for instruction-level monitoring on the x86 architecture
-
S. Vogl and C. Eckert. Using hardware performance events for instruction-level monitoring on the x86 architecture. In EuroSec'12.
-
EuroSec'12
-
-
Vogl, S.1
Eckert, C.2
-
38
-
-
84893212221
-
Down to the bare metal: Using processor features for binary analysis
-
C. Willems, R. Hund, A. Fobian, D. Felsch, T. Holz, and A. Vasudevan. Down to the bare metal: Using processor features for binary analysis. In ACSAC'12.
-
ACSAC'12
-
-
Willems, C.1
Hund, R.2
Fobian, A.3
Felsch, D.4
Holz, T.5
Vasudevan, A.6
-
39
-
-
84863351787
-
V2e: Combining hardware virtualization and softwareemulation for transparent and extensible malware analysis
-
L.-K. Yan, M. Jayachandra, M. Zhang, and H. Yin. V2e: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis. In VEE'12.
-
VEE'12
-
-
Yan, L.-K.1
Jayachandra, M.2
Zhang, M.3
Yin, H.4
-
40
-
-
84893222031
-
-
O. Yuschuk. Ollydbg. http://www.ollydbg.de/.
-
-
-
Yuschuk, O.1
|