Linear Obfuscation to Combat Symbolic Execution

作者: Zhi Wang , Jiang Ming , Chunfu Jia , Debin Gao

DOI: 10.1007/978-3-642-23822-2_12

关键词:

摘要: … binaries [12,28,40,2]. Brumley et al. proposed MineSweeper [3] that utilizes static analysis and symbolic execution … ger overflow vulnerability in x86 binary using symbolic execution. In: …

参考文章(38)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Wenke Lee, Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Impeding Malware Analysis Using Conditional Code Obfuscation network and distributed system security symposium. pp. 1- 13 ,(2008)
Tielei Wang, Zhiqiang Lin, Tao Wei, Wei Zou, IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. network and distributed system security symposium. ,(2009)
David A. Molnar, Michael Y. Levin, Patrice Godefroid, Automated Whitebox Fuzz Testing. network and distributed system security symposium. ,(2008)
Peter Boonstoppel, Cristian Cadar, Dawson Engler, RWset: attacking path explosion in constraint-based test generation tools and algorithms for construction and analysis of systems. pp. 351- 366 ,(2008) , 10.1007/978-3-540-78800-3_27
David Molnar, David A. Wagner, Xue Cong Li, Dynamic test generation to find integer bugs in x86 binary linux programs usenix security symposium. pp. 67- 82 ,(2009)
David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin, Automatically Identifying Trigger-based Behavior in Malware Botnet Detection. pp. 65- 88 ,(2008) , 10.1007/978-0-387-68768-1_4
Saumya K. Debray, Gregory R. Andrews, Igor V. Popov, Binary obfuscation using signals usenix security symposium. pp. 19- ,(2007)
Richard K. Guy, Unsolved Problems in Number Theory ,(1981)
Rajeev Alur, Kousha Etessami, P. Madhusudan, A Temporal Logic of Nested Calls and Returns tools and algorithms for construction and analysis of systems. ,vol. 2988, pp. 467- 481 ,(2004) , 10.1007/978-3-540-24730-2_35