Sciweavers

2 search results - page 1 / 1
» Context-sensitive analysis of obfuscated x86 executables
Sort
View
PEPM
2010
ACM
14 years 1 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
13 years 11 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...