메뉴 건너뛰기




Volumn , Issue , 2006, Pages 57-65

Metamorphism: A software protection mechanism

Author keywords

Anti debugging; Anti disassembly; Metamorphism; Opcode shifting; Software protection

Indexed keywords

COMPUTER CRIME; PROGRAM DEBUGGING; VIRUSES;

EID: 84896305038     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (10)
  • 1
    • 32044431524 scopus 로고    scopus 로고
    • The IDA Pro Disassembler and Debugger
    • DataRescue, online
    • DataRescue (2005) 'The IDA Pro Disassembler and Debugger', [online], http://www.datarescue.com/idabase
    • (2005)
  • 2
    • 0348179884 scopus 로고    scopus 로고
    • online, Dictionary.com (taken from American Heritage® Dictionary of the English Language (Fourth Edition, Houghton Mifflin Company
    • Dictionary.com (2005) 'metamorphosis', [online], Dictionary.com (taken from American Heritage® Dictionary of the English Language (Fourth Edition) (2000) Houghton Mifflin Company), http://dictionary.reference.com/search?q=metamorphosis
    • (2000) metamorphosis
  • 3
    • 33746604180 scopus 로고    scopus 로고
    • Reversing: Secrets of Reverse Engineering
    • Indianapolis: Wiley Publishing
    • Eilam, E. (2005) 'Reversing: Secrets of Reverse Engineering', Indianapolis: Wiley Publishing.
    • (2005)
    • Eilam, E.1
  • 4
    • 33846272389 scopus 로고    scopus 로고
    • Strengthening Software Self-Checksumming via Self - Modifying Code
    • University of Wisconsin
    • Giffin, J., Christodorescu, M., and Kruger, L. (2005) 'Strengthening Software Self-Checksumming via Self - Modifying Code',Computer Sciences Department, University of Wisconsin.
    • (2005) Computer Sciences Department
    • Giffin, J.1    Christodorescu, M.2    Kruger, L.3
  • 5
    • 26044480767 scopus 로고    scopus 로고
    • IA-32 Intel Architecture Software Developer's Manual Volume 2B
    • Intel, Intel Corporation
    • Intel (2005) 'IA-32 Intel Architecture Software Developer's Manual Volume 2B', Intel Corporation.
    • (2005)
  • 6
    • 84896297674 scopus 로고    scopus 로고
    • SciMark 2.0
    • online
    • Pozo, R. and Miller, B. (2004) 'SciMark 2.0', [online], NIST, http://math.nist.gov/scimark2
    • (2004) NIST
    • Pozo, R.1    Miller, B.2
  • 7
    • 33646414637 scopus 로고    scopus 로고
    • The Art of Computer Virus Research and Defense
    • Indianapolis : Addison-Wesley
    • Szor, P. (2005) 'The Art of Computer Virus Research and Defense', Indianapolis : Addison-Wesley.
    • (2005)
    • Szor, P.1
  • 8
    • 84896310574 scopus 로고    scopus 로고
    • Self-modifying code
    • Wikipedia, online
    • Wikipedia (2005) 'Self-modifying code', [online], Wikipedia, http://en.wikipedia.org/wiki/Self-modifying_code
    • (2005) Wikipedia
  • 9
    • 84896306807 scopus 로고    scopus 로고
    • Enhancing software protection with poly-metamorphic code
    • online
    • Yip, S. and Zhou Q. (2004) 'Enhancing software protection with poly-metamorphic code', [online], New South Wales Society for Computers and the Law, Issue 56, http://www.nswscl.org.au/journal/56/YipZhao.html
    • (2004) New South Wales Society for Computers and the Law , Issue.56
    • Yip, S.1    Zhou, Q.2
  • 10
    • 84871114605 scopus 로고    scopus 로고
    • online
    • Yuschuk, O. (2005) 'OllyDbg', [online], http://www.ollydbg.de
    • OllyDbg
    • Yuschuk, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.