Stack Shape Analysis to Detect Obfuscated calls in Binaries
暂无分享,去创建一个
[1] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[2] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[3] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[4] Understanding Heuristics : Symantec ’ s Bloodhound Technology , 1997 .
[5] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[6] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[7] Arun Lakhotia,et al. CHALLENGES IN GETTING ‘FORMAL’ WITH VIRUSES , 2003 .
[8] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[9] Cristina Cifuentes,et al. Decompilation of binary programs , 1995, Softw. Pract. Exp..
[10] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[11] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[12] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..