WCRE   2010 Working Conference on Reverse Engineering
Wall of Fame | Most Viewed WCRE-2010 Paper
13 years 2 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source280
2Download preprint from source272
3Download preprint from source217
4Download preprint from source207
5Download preprint from source204
6Download preprint from source179
7Download preprint from source176
8Download preprint from source171
9Download preprint from source163
10Download preprint from source161
11Download preprint from source160
12Download preprint from source156
13Download preprint from source154
14Download preprint from source153
15Download preprint from source128