Next: About this document ...
Up: Static Disassembly of Obfuscated
Previous: Conclusions
- 1
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and
K. Yang.
On the (Im)possibility of Software Obfuscation.
In In Proceedings of Crypto, 2001.
- 2
-
J. Bergeron, M. Debbabi, M.M. Erhioui, and B. Ktari.
Static Analysis of Binary Code to Isolate Malicious Behaviors.
In In Proceedinsg of 8th IEEE International Workshops on
Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999.
- 3
-
M. Christodorescu and Somesh Jha.
Static Analysis of Executables to Detect Malicious Patterns.
In Proceedings of the 12th USENIX Security Symposium, 2003.
- 4
-
C. Cifuentes and M. Van Emmerik.
UQBT: Adaptable binary translation at low cost.
IEEE Computer, 40(2-3), 2000.
- 5
-
C. Cifuentes and A. Fraboulet.
Intraprocedural Static Slicing of Binary Executables.
In Proceedings of the International Conference on Software
Maintenance (ICSM '97), Bari, Italy, October 1997.
- 6
-
C. Cifuentes and K. Gough.
Decompilation of Binary Programs.
Software Practice & Experience, 25(7):811-829, July 1995.
- 7
-
F. B. Cohen.
Operating System Protection through Program Evolution.
https://all.net/books/IP/evolve.html.
- 8
-
C. Collberg and C. Thomborson.
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software
Protection.
IEEE Transactions on Software Engineering, 28(8):735-746,
August 2002.
- 9
-
C. Collberg, C. Thomborson, and D. Low.
A Taxonomy of Obfuscating Transformations.
Technical Report 148, Department of Computer Science, University of
Auckland, July 1997.
- 10
-
Free Software Foundation.
GNU Binary Utilities, Mar 2002.
https://www.gnu.org/software/binutils/manual/.
- 11
-
J.T. Giffin, S. Jha, and B.P. Miller.
Detecting manipulated remote call streams.
In In Proceedings of 11th USENIX Security Symposium, 2002.
- 12
-
W.C. Hsieh, D. Engler, and G. Back.
Reverse-Engineering Instruction Encodings.
In Proceedings of the USENIX Annual Technical Conference, pages
133-146, Boston, Mass., June 2001.
- 13
-
C. Linn and S. Debray.
Obfuscation of executable code to improve resistance to static
disassembly.
In Proceedings of the 10th ACM Conference on Computer and
Communications Security (CCS), pages 290-299, Washington, DC, October 2003.
- 14
-
T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji.
Software obfuscation on a theoretical basis and its implementation.
IEICE Transactions on Fundamentals, E86-A(1), 2003.
- 15
-
R. Sites, A. Chernoff, M. Kirk, M. Marks, and S. Robinson.
Binary Translation.
Digital Technical Journal, 4(4), 1992.
- 16
-
Symantec.
Understanding and Managing Polymorphic Viruses.
https://www.symantec.com/avcenter/whitepapers.html.
- 17
-
C. Wang, J. Davidson, J. Hill, and J. Knight.
Protection of Software-based Survivability Mechanisms.
In In Proceedings of International Conference of Dependable
Systems and Networks, 2001.
- 18
-
G. Wroblewski.
General Method of Program Code Obfuscation.
In Proceedings of the International Conference on Software
Engineering Research and Practice (SERP), Las Vegas, NV, June 2002.
2004-05-18