The malicious code hiding techniques, code obfuscation problem

作者: Jan Hurtuk , Marek Copjak , Marek Dufala , Pavol Drienik

DOI: 10.1109/ICETA.2014.7107581

关键词:

摘要: Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on market so gathering it, buy or sell it becomes important part doing business. Because prizing, more sophisticated ways processing are still being developed, various kinds faster systems created complex made, which clearly opens paths for criminal menaces. To able to react appropriate fast this threads protect property its own, data find an solution protecting them preventing from damage any other misusing, man should aware processes behind whole cycle define menace scope given general situation scenario.

参考文章(9)
Ravi Sethi, Jeffrey D. Ullman, Alfred V. Aho, Compilers: Principles, Techniques, and Tools ,(1986)
Maurice H. Halstead, Elements of software science Elsevier. ,(1977)
Bartosz Zoltak, VMPC One-Way Function and Stream Cipher fast software encryption. pp. 210- 225 ,(2004) , 10.1007/978-3-540-25937-4_14
Souradyuti Paul, Bart Preneel, Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Progress in Cryptology - INDOCRYPT 2003. ,vol. 2904, pp. 52- 67 ,(2003) , 10.1007/978-3-540-24582-7_4
Joris Kinable, Orestis Kostakis, Malware classification based on call graph clustering Journal of Computer Virology and Hacking Techniques. ,vol. 7, pp. 233- 245 ,(2011) , 10.1007/S11416-011-0151-Y
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
H. G. Rice, Classes of recursively enumerable sets and their decision problems Transactions of the American Mathematical Society. ,vol. 74, pp. 358- 366 ,(1953) , 10.1090/S0002-9947-1953-0053041-6
Liberios Vokorokos, Anton Baláž, Branislav Madoš, Intrusion Detection Architecture Utilizing Graphics Processors Acta Informatica Pragensia. ,vol. 1, pp. 50- 59 ,(2012) , 10.18267/J.AIP.5
Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang, On the (Im)possibility of Obfuscating Programs international cryptology conference. pp. 1- 18 ,(2001) , 10.1007/3-540-44647-8_1