Sciweavers

11 search results - page 1 / 3
» Control Code Obfuscation by Abstract Interpretation
Sort
View
SEFM
2005
IEEE
15 years 3 months ago
Control Code Obfuscation by Abstract Interpretation
Mila Dalla Preda, Roberto Giacobazzi
101
Voted
RAID
2010
Springer
14 years 8 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
100
Voted
PEPM
2010
ACM
15 years 6 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
VIROLOGY
2010
179views more  VIROLOGY 2010»
14 years 7 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
75
Voted
FMCO
2003
Springer
123views Formal Methods» more  FMCO 2003»
15 years 2 months ago
Machine Function Based Control Code Algebras
Abstract. Machine functions have been introduced by Earley and Sturgis in [6] in order to provide a mathematical foundation of the use of the T-diagrams proposed by Bratman in [5]....
Jan A. Bergstra