Sciweavers

85 search results - page 2 / 17
» Mimimorphism: a new approach to binary code obfuscation
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 6 days ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
ACSAC
2006
IEEE
13 years 11 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ICSM
2009
IEEE
13 years 12 months ago
Detecting virus mutations via dynamic matching
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle...
Min Feng, Rajiv Gupta
DCC
2004
IEEE
14 years 4 months ago
On Some New Approaches to Practical Slepian-Wolf Compression Inspired by Channel Coding
We introduce three new innovations for compression using LDPCs for the Slepian-Wolf problem. The first is a general iterative Slepian-Wolf decoding algorithm that incorporates the...
Anna H. Lee, Michelle Effros, Muriel Médard...