Symbolic Execution of Obfuscated Code

作者: Babak Yadegari , Saumya Debray

DOI: 10.1145/2810103.2813663

关键词:

摘要: … binaries for Windows operating system, so for collecting an execution trace, we ran the obfuscated binaries along … Vine is a static analysis tool based on Bitblaze and can analyze traces …

参考文章(34)
Lorenzo Cavallaro, Prateek Saxena, R. Sekar, On the Limits of Information Flow Techniques for Malware Analysis and Containment international conference on detection of intrusions and malware and vulnerability assessment. pp. 143- 163 ,(2008) , 10.1007/978-3-540-70542-0_8
Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray, A Generic Approach to Automatic Deobfuscation of Executable Code 2015 IEEE Symposium on Security and Privacy. pp. 674- 691 ,(2015) , 10.1109/SP.2015.47
Fredrik Valeur, Christopher Kruegel, Giovanni Vigna, William Robertson, Static disassembly of obfuscated binaries usenix security symposium. pp. 18- 18 ,(2004)
Babil Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed-Ali Kaafar, None, On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices international conference on security and cryptography. pp. 461- 468 ,(2013)
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, Engin Kirda, Scalable, behavior-based malware clustering network and distributed system security symposium. ,(2009)
Frederic Tronel, Jason Reid, Christophe Hauser, Colin Fidge, A taint marking approach to confidentiality violation detection information security conference. ,vol. 125, pp. 83- 90 ,(2012)
S. Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh, BIRD: Binary Interpretation using Runtime Disassembly symposium on code generation and optimization. pp. 358- 370 ,(2006) , 10.1109/CGO.2006.6
Koushik Sen, Darko Marinov, Gul Agha, CUTE: a concolic unit testing engine for C foundations of software engineering. ,vol. 30, pp. 263- 272 ,(2005) , 10.1145/1081706.1081750
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler, EXE ACM Transactions on Information and System Security. ,vol. 12, pp. 1- 38 ,(2008) , 10.1145/1455518.1455522
Christophe Hauser, Frederic Tronel, Colin Fidge, Ludovic Me, Intrusion detection in distributed systems, an approach based on taint marking 2013 IEEE International Conference on Communications (ICC). pp. 1962- 1967 ,(2013) , 10.1109/ICC.2013.6654811