Symbolic Execution of Obfuscated Code
暂无分享,去创建一个
[1] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[2] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[3] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[4] Arun Lakhotia,et al. A method for detecting obfuscated calls in malicious binaries , 2005, IEEE Transactions on Software Engineering.
[5] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[6] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] R. Sekar,et al. Practical Dynamic Taint Analysis for Countering Input Validation Attacks on Web Applications , 2005 .
[8] Saumya Debray,et al. A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[10] Zhendong Su,et al. Temporal search: detecting hidden malware timebombs with virtual machines , 2006, ASPLOS XII.
[11] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[12] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[13] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[14] P. Saxena,et al. Anti-Taint-Analysis : Practical Evasion Techniques Against Information Flow Based Malware Defense , 2007 .
[15] Colin J. Fidge,et al. Intrusion detection in distributed systems, an approach based on taint marking , 2013, 2013 IEEE International Conference on Communications (ICC).
[16] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Colin J. Fidge,et al. A taint marking approach to confidentiality violation detection , 2012, AISC.
[18] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[19] Will Drewry,et al. Flayer: Exposing Application Internals , 2007, WOOT.
[20] Debin Gao,et al. Linear Obfuscation to Combat Symbolic Execution , 2011, ESORICS.
[21] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[22] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[23] Zhenkai Liang,et al. Automatically Identifying Trigger-based Behavior in Malware , 2008, Botnet Detection.
[24] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[25] Saumya K. Debray,et al. Deobfuscation: reverse engineering obfuscated code , 2005, 12th Working Conference on Reverse Engineering (WCRE'05).
[26] Sarfraz Khurshid,et al. Symbolic execution for software testing in practice: preliminary assessment , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[27] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[28] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[29] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[30] Dawson R. Engler,et al. Execution Generated Test Cases: How to Make Systems Code Crash Itself , 2005, SPIN.
[31] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[32] Tzi-cker Chiueh,et al. BIRD: binary interpretation using runtime disassembly , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[33] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[34] Kevin Coogan,et al. Deobfuscation of virtualization-obfuscated software: a semantics-based approach , 2011, CCS '11.
[35] Heng Yin,et al. Analysis of Trigger Conditions and Hidden Behaviors , 2013 .
[36] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.