Sciweavers

Share
5 search results - page 1 / 1
» Automatic Static Unpacking of Malware Binaries
Sort
View
WCRE
2009
IEEE
12 years 6 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
ACSAC
2006
IEEE
12 years 6 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ICICS
2009
Springer
12 years 6 months ago
Denial-of-Service Attacks on Host-Based Generic Unpackers
With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without speci...
Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
12 years 3 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
PASTE
2010
ACM
12 years 5 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
books