Search
Now showing items 1-10 of 96
Context-sensitive analysis of obfuscated x86 executables
(2010-04-20)
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ...
Context-sensitive analysis of obfuscated x86 executables
(2010-04-20)
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ...
Obfuscation procedure based in dead code insertion into crypter
(IEEE, 2016)
The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique ...
Context-sensitive analysis of x86 obfuscated executables
(Universidade Estadual Paulista (Unesp), 2009-10-09)
Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem antica. Desenvolvedores de software usam ...
Context-sensitive analysis of x86 obfuscated executables
(Universidade Estadual Paulista (Unesp), 2009-10-09)
Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem antica. Desenvolvedores de software usam ...
Vision: Alleviating Android developer burden on obfuscation
(Association for Computing Machinery, Inc, 2020)
Context-sensitive analysis of x86 obfuscated executables
(Universidade Estadual Paulista (UNESP), 2014)