SP   2009 IEEE Symposium on Security and Privacy
Wall of Fame | Most Viewed SP-2009 Paper
262views Security Privacy» more  SP 2009»
12 years 6 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source262
2Download preprint from source155
3Download preprint from source144
4Download preprint from source144
5Download preprint from source143
6Download preprint from source130
7Download preprint from source129
8Download preprint from source128
9Download preprint from source128
10Download preprint from source123
11Download preprint from source122
12Download preprint from source114
13Download preprint from source106
14Download preprint from source101
15Download preprint from source97
16Download preprint from source95
17Download preprint from source90
18Download preprint from source86
19Download preprint from source77