Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Static Disassembly of Obfuscated Previous: Conclusions

Bibliography

1
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang.
On the (Im)possibility of Software Obfuscation.
In In Proceedings of Crypto, 2001.

2
J. Bergeron, M. Debbabi, M.M. Erhioui, and B. Ktari.
Static Analysis of Binary Code to Isolate Malicious Behaviors.
In In Proceedinsg of 8th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999.

3
M. Christodorescu and Somesh Jha.
Static Analysis of Executables to Detect Malicious Patterns.
In Proceedings of the 12th USENIX Security Symposium, 2003.

4
C. Cifuentes and M. Van Emmerik.
UQBT: Adaptable binary translation at low cost.
IEEE Computer, 40(2-3), 2000.

5
C. Cifuentes and A. Fraboulet.
Intraprocedural Static Slicing of Binary Executables.
In Proceedings of the International Conference on Software Maintenance (ICSM '97), Bari, Italy, October 1997.

6
C. Cifuentes and K. Gough.
Decompilation of Binary Programs.
Software Practice & Experience, 25(7):811-829, July 1995.

7
F. B. Cohen.
Operating System Protection through Program Evolution.
https://all.net/books/IP/evolve.html.

8
C. Collberg and C. Thomborson.
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection.
IEEE Transactions on Software Engineering, 28(8):735-746, August 2002.

9
C. Collberg, C. Thomborson, and D. Low.
A Taxonomy of Obfuscating Transformations.
Technical Report 148, Department of Computer Science, University of Auckland, July 1997.

10
Free Software Foundation.
GNU Binary Utilities, Mar 2002.
https://www.gnu.org/software/binutils/manual/.

11
J.T. Giffin, S. Jha, and B.P. Miller.
Detecting manipulated remote call streams.
In In Proceedings of 11th USENIX Security Symposium, 2002.

12
W.C. Hsieh, D. Engler, and G. Back.
Reverse-Engineering Instruction Encodings.
In Proceedings of the USENIX Annual Technical Conference, pages 133-146, Boston, Mass., June 2001.

13
C. Linn and S. Debray.
Obfuscation of executable code to improve resistance to static disassembly.
In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pages 290-299, Washington, DC, October 2003.

14
T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji.
Software obfuscation on a theoretical basis and its implementation.
IEICE Transactions on Fundamentals, E86-A(1), 2003.

15
R. Sites, A. Chernoff, M. Kirk, M. Marks, and S. Robinson.
Binary Translation.
Digital Technical Journal, 4(4), 1992.

16
Symantec.
Understanding and Managing Polymorphic Viruses.
https://www.symantec.com/avcenter/whitepapers.html.

17
C. Wang, J. Davidson, J. Hill, and J. Knight.
Protection of Software-based Survivability Mechanisms.
In In Proceedings of International Conference of Dependable Systems and Networks, 2001.

18
G. Wroblewski.
General Method of Program Code Obfuscation.
In Proceedings of the International Conference on Software Engineering Research and Practice (SERP), Las Vegas, NV, June 2002.



2004-05-18