An Approach towards Disassembly of Malicious Binary Executables
暂无分享,去创建一个
Andrew Walenstein | Arun Lakhotia | Dmitri Perkins | William R. Edwards | Prashant Pathak | Aditya Kapoor | Nitin Jyoti | Eric Uday | C. E. Palmer | Firas Bouz | Bunty Agrawal | Alok S. Singh
[1] Arun Lakhotia,et al. CHALLENGES IN GETTING ‘FORMAL’ WITH VIRUSES , 2003 .
[2] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[3] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[4] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[5] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[6] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[7] Evgeniy Gabrilovich,et al. JNI-C++ integration made easy , 2001 .
[8] Richard L. Sites,et al. Binary translation , 1993, CACM.
[9] Mike Van,et al. UQBT: Adaptable Binary Translation at Low Cost , 2000 .
[10] S. Fouzi Husaini. Using the Java Native Interface , 1997, CROS.
[11] Koen De Bosschere,et al. alto: a link-time optimizer for the Compaq Alpha , 2001, Softw. Pract. Exp..
[12] R. Nigel Horspool,et al. An Approach to the Problem of Detranslation of Computer Programs , 1980, Comput. J..
[13] Linda M. Wills,et al. An experimentation framework for evaluating disassembly and decompilation tools for C++ and java , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..