Analyzing Memory Accesses in Obfuscated x86 Executables
暂无分享,去创建一个
[1] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[2] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[3] Patrick Cousot,et al. Static determination of dynamic properties of programs , 1976 .
[4] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[5] P. Tonella,et al. Adding distribution to existing applications by means of aspect oriented programming , 2004 .
[6] Arun Lakhotia,et al. CHALLENGES IN GETTING ‘FORMAL’ WITH VIRUSES , 2003 .
[7] Shinichiro Yamamoto,et al. A CASE tool platform using an XML representation of Java source code , 2004, Source Code Analysis and Manipulation, Fourth IEEE International Workshop on.
[8] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[9] Arun Lakhotia,et al. Abstract Stack Graph to Detect Obfuscated Calls in Binaries , 2004 .
[10] Understanding Heuristics : Symantec ’ s Bloodhound Technology , 1997 .
[11] Mourad Debbabi,et al. Detection of Malicious Code in Cots Software: A Short Survey , 1999 .