Sciweavers

11 search results - page 1 / 3
» Control Code Obfuscation by Abstract Interpretation
Sort
View
SEFM
2005
IEEE
13 years 10 months ago
Control Code Obfuscation by Abstract Interpretation
Mila Dalla Preda, Roberto Giacobazzi
RAID
2010
Springer
13 years 3 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
PEPM
2010
ACM
14 years 1 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 3 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
FMCO
2003
Springer
123views Formal Methods» more  FMCO 2003»
13 years 10 months ago
Machine Function Based Control Code Algebras
Abstract. Machine functions have been introduced by Earley and Sturgis in [6] in order to provide a mathematical foundation of the use of the T-diagrams proposed by Bratman in [5]....
Jan A. Bergstra