-
3
-
-
73449099878
-
Linux anti-debugging techniques (fooling the debugger)
-
January VX Heavens
-
S. Cesare. Linux anti-debugging techniques (fooling the debugger), January 1999. VX Heavens. http://vx.netlux.org/lib/vsc04.html.
-
(1999)
-
-
Cesare, S.1
-
4
-
-
27544433210
-
Semantics-aware malware detection
-
May
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-aware malware detection. In Proc. 2005 IEEE Symposium on Security and Privacy (Oakland 2005), pages 32–46, May 2005.
-
(2005)
Proc. 2005 IEEE Symposium on Security and Privacy (Oakland 2005)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
5
-
-
0004148980
-
-
PhD thesis, Queensland University of Technology, Australia, July
-
C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, Australia, July 1994.
-
(1994)
Reverse Compilation Techniques
-
-
Cifuentes, C.1
-
8
-
-
0031363362
-
Optimizing alpha executables on windows NT with spike
-
R. S. Cohn, D. W. Goodwin, and P. G. Lowney. Optimizing Alpha executables on Windows NT with Spike. Digital Technical Journal, 9(4):3–20, 1997.
-
(1997)
Digital Technical Journal
, vol.9
, Issue.4
, pp. 3-20
-
-
Cohn, R.S.1
Goodwin, D.W.2
Lowney, P.G.3
-
9
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation – tools for software protection
-
August
-
C. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation – tools for software protection. IEEE Transactions on Software Engineering, 28(8), August 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
-
-
Collberg, C.1
Thomborson, C.2
-
11
-
-
85077683351
-
-
sa/nv, Liége, Belgium. IDA Pro
-
DataRescue sa/nv, Liége, Belgium. IDA Pro. http://www.datarescue.com/idabase/.
-
DataRescue
-
-
-
12
-
-
0021467937
-
Storing a sparse table with o(1) worst case access time
-
July
-
M. L. Fredman, J. Komlós, and E. Szemerédi. Storing a sparse table with O(1) worst case access time. Journal of the ACM, 31(3):538–544, July 1984.
-
(1984)
Journal of the ACM
, vol.31
, Issue.3
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
16
-
-
33745670395
-
Polymorphic worm detection using structural information of executables
-
Springer
-
C. Krügel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Recent Advances in Intrusion Detection, volume 3858 of Lecture Notes in Computer Science, pages 207–226. Springer, 2005.
-
(2005)
Recent Advances in Intrusion Detection, Volume 3858 of Lecture Notes in Computer Science
, pp. 207-226
-
-
Krügel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
18
-
-
33751120104
-
A method for detecting obfuscated calls in malicious binaries
-
A. Lakhotia, E. U. Kumar, and M. Venable. A method for detecting obfuscated calls in malicious binaries. IEEE Transactions on Software Engineering, 31(11):955–968, 2005.
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.11
, pp. 955-968
-
-
Lakhotia, A.1
Kumar, E.U.2
Venable, M.3
-
19
-
-
17544370316
-
Architectural support for copy and tamper resistant software
-
November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proc. 9th. International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pages 168–177, November 2000.
-
(2000)
Proc. 9th. International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
21
-
-
84868352987
-
Protecting against unexpected system calls
-
August
-
C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, and J. H. Hartman. Protecting against unexpected system calls. In Proc. Usenix Security ’05, pages 239–254, August 2005.
-
(2005)
Proc. Usenix Security ’05
, pp. 239-254
-
-
Linn, C.M.1
Rajagopalan, M.2
Baker, S.3
Collberg, C.4
Debray, S.K.5
Hartman, J.H.6
-
23
-
-
0035111361
-
Alto: A link-time optimizer for the compaq alpha
-
January
-
R. Muth, S. K. Debray, S. Watterson, and K. De Bosschere. alto: A link-time optimizer for the Compaq Alpha. Software—Practice and Experience, 31:67–101, January 2001.
-
(2001)
Software—Practice and Experience
, vol.31
, pp. 67-101
-
-
Muth, R.1
Debray, S.K.2
Watterson, S.3
de Bosschere, K.4
-
24
-
-
84860925323
-
-
GNU Project—Free Software Foundation
-
Objdump. GNU Manuals Online. GNU Project—Free Software Foundation. www.gnu.org/manual/binutils-2.10.1/html_chapter/binutils_4.html.
-
GNU Manuals Online
-
-
-
25
-
-
2642520196
-
A binary rewriting defense against stack based buffer overflow attacks
-
June
-
M. Prasad and T. Chiueh. A binary rewriting defense against stack based buffer overflow attacks. In Proc. USENIX Technical Conference, June 2003.
-
(2003)
Proc. USENIX Technical Conference
-
-
Prasad, M.1
Chiueh, T.2
-
28
-
-
0002254859
-
Binary translation
-
February
-
R. L. Sites, A. Chernoff, M. B. Kirk, M. P. Marks, and S. G. Robinson. Binary translation. Communications of the ACM, 36(2):69–81, February 1993.
-
(1993)
Communications of the ACM
, vol.36
, Issue.2
, pp. 69-81
-
-
Sites, R.L.1
Chernoff, A.2
Kirk, M.B.3
Marks, M.P.4
Robinson, S.G.5
-
29
-
-
0000528368
-
A practical system for intermodule code optimization at link-time
-
March
-
A. Srivastava and D. W. Wall. A practical system for intermodule code optimization at link-time. Journal of Programming Languages, 1(1):1–18, March 1993.
-
(1993)
Journal of Programming Languages
, vol.1
, Issue.1
, pp. 1-18
-
-
Srivastava, A.1
Wall, D.W.2
-
32
-
-
0012037951
-
-
Technical Report CS-2000-12, Dept. of Computer Science, University of Virginia, 12
-
C. Wang, J. Hill, J. Knight, and J. Davidson. Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, Dept. of Computer Science, University of Virginia, 12 2000.
-
(2000)
Software Tamper Resistance: Obstructing Static Analysis of Programs
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
|