Author:
Anckaert Bertrand,Madou Matias,De Bosschere Koen
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Lecture Notes in Computer Science;D. Aucsmith,1996
2. Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, pp. 169–186. USENIX Association (2003)
3. Cifuentes, C., Gough, K.: Decompilation of binary programs. Software - Practice & Experience 25(7), 811–829 (1995)
4. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering 28(8), 735–746 (2002)
5. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proc. of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 184–196 (1998)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the Decidability of Disassembling Binaries;Lecture Notes in Computer Science;2024
2. Just-In-Time Compilation on ARM—A Closer Look at Call-Site Code Consistency;ACM Transactions on Architecture and Code Optimization;2022-09-16
3. LTL model checking of self modifying code;Formal Methods in System Design;2022-04
4. An analysis of call-site patching without strong hardware support for self-modifying-code;Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes - MPLR 2019;2019
5. DynODet: Detecting Dynamic Obfuscation in Malware;Detection of Intrusions and Malware, and Vulnerability Assessment;2017