Malware Dynamic Recompilation
暂无分享,去创建一个
[1] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[2] Thomas W. Reps,et al. CodeSurfer/x86-A Platform for Analyzing x86 Executables , 2005, CC.
[3] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[4] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[5] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[6] Milo M. K. Martin,et al. Formalizing the LLVM intermediate representation for verified program transformations , 2012, POPL '12.
[7] Thomas Dullien,et al. REIL: A platform-independent intermediate representation of disassembled code for static code analysis , 2009 .
[8] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[9] Sébastien Josse,et al. Rootkit detection from outside the Matrix , 2007, Journal in Computer Virology.
[10] Sébastien Josse. Secure and advanced unpacking using computer emulation , 2007, Journal in Computer Virology.
[11] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[12] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[13] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[14] П. Довгалюк,et al. Два способа организации механизма полносистемного детерминированного воспроизведения в симуляторе QEMU , 2012 .
[15] Bart Preneel,et al. A general model for hiding control flow , 2010, DRM '10.
[16] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.