메뉴 건너뛰기




Volumn , Issue , 2007, Pages 275-290

Binary obfuscation using signals

Author keywords

[No Author keywords available]

Indexed keywords

BINARY PROGRAMS; CONTROL FLOWS; DISASSEMBLERS; LEVEL STRUCTURE; MACHINE CODES; PROGRAM REPRESENTATIONS; SECURITY VULNERABILITIES; SOURCE CODES;

EID: 85045981068     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (119)

References (33)
  • 3
    • 73449099878 scopus 로고    scopus 로고
    • Linux anti-debugging techniques (fooling the debugger)
    • January VX Heavens
    • S. Cesare. Linux anti-debugging techniques (fooling the debugger), January 1999. VX Heavens. http://vx.netlux.org/lib/vsc04.html.
    • (1999)
    • Cesare, S.1
  • 5
    • 0004148980 scopus 로고
    • PhD thesis, Queensland University of Technology, Australia, July
    • C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, Australia, July 1994.
    • (1994) Reverse Compilation Techniques
    • Cifuentes, C.1
  • 8
    • 0031363362 scopus 로고    scopus 로고
    • Optimizing alpha executables on windows NT with spike
    • R. S. Cohn, D. W. Goodwin, and P. G. Lowney. Optimizing Alpha executables on Windows NT with Spike. Digital Technical Journal, 9(4):3–20, 1997.
    • (1997) Digital Technical Journal , vol.9 , Issue.4 , pp. 3-20
    • Cohn, R.S.1    Goodwin, D.W.2    Lowney, P.G.3
  • 9
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation – tools for software protection
    • August
    • C. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation – tools for software protection. IEEE Transactions on Software Engineering, 28(8), August 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8
    • Collberg, C.1    Thomborson, C.2
  • 11
    • 85077683351 scopus 로고    scopus 로고
    • sa/nv, Liége, Belgium. IDA Pro
    • DataRescue sa/nv, Liége, Belgium. IDA Pro. http://www.datarescue.com/idabase/.
    • DataRescue
  • 12
    • 0021467937 scopus 로고
    • Storing a sparse table with o(1) worst case access time
    • July
    • M. L. Fredman, J. Komlós, and E. Szemerédi. Storing a sparse table with O(1) worst case access time. Journal of the ACM, 31(3):538–544, July 1984.
    • (1984) Journal of the ACM , vol.31 , Issue.3 , pp. 538-544
    • Fredman, M.L.1    Komlós, J.2    Szemerédi, E.3
  • 17
    • 33846263562 scopus 로고    scopus 로고
    • DOC – answering the hidden ‘call’ of a virus
    • April
    • E. U. Kumar, A. Kapoor, and A. Lakhotia. DOC – answering the hidden ‘call’ of a virus. Virus Bulletin, April 2005.
    • (2005) Virus Bulletin
    • Kumar, E.U.1    Kapoor, A.2    Lakhotia, A.3
  • 24
    • 84860925323 scopus 로고    scopus 로고
    • GNU Project—Free Software Foundation
    • Objdump. GNU Manuals Online. GNU Project—Free Software Foundation. www.gnu.org/manual/binutils-2.10.1/html_chapter/binutils_4.html.
    • GNU Manuals Online
  • 25
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack based buffer overflow attacks
    • June
    • M. Prasad and T. Chiueh. A binary rewriting defense against stack based buffer overflow attacks. In Proc. USENIX Technical Conference, June 2003.
    • (2003) Proc. USENIX Technical Conference
    • Prasad, M.1    Chiueh, T.2
  • 29
    • 0000528368 scopus 로고
    • A practical system for intermodule code optimization at link-time
    • March
    • A. Srivastava and D. W. Wall. A practical system for intermodule code optimization at link-time. Journal of Programming Languages, 1(1):1–18, March 1993.
    • (1993) Journal of Programming Languages , vol.1 , Issue.1 , pp. 1-18
    • Srivastava, A.1    Wall, D.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.