A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly

作者: Yu-Jye Tung , Ian G. Harris

DOI: 10.14722/BAR.2020.23004

关键词:

摘要:

参考文章(27)
David Brumley, Ivan Jager, Thanassis Avgerinos, Edward J. Schwartz, BAP: a binary analysis platform computer aided verification. pp. 463- 469 ,(2011) , 10.1007/978-3-642-22110-1_37
Adel Djoudi, Sébastien Bardin, BINSEC: Binary Code Analysis with Low-Level Regions Tools and Algorithms for the Construction and Analysis of Systems. pp. 212- 217 ,(2015) , 10.1007/978-3-662-46681-0_17
Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi, Opaque predicates detection by abstract interpretation algebraic methodology and software technology. ,vol. 4019, pp. 81- 95 ,(2006) , 10.1007/11784180_9
Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray, A Generic Approach to Automatic Deobfuscation of Executable Code 2015 IEEE Symposium on Security and Privacy. pp. 674- 691 ,(2015) , 10.1109/SP.2015.47
Fredrik Valeur, Christopher Kruegel, Giovanni Vigna, William Robertson, Static disassembly of obfuscated binaries usenix security symposium. pp. 18- 18 ,(2004)
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Sebastian Banescu, Alexander Pretschner, Martin Ochoa, A framework for measuring software obfuscation resilience against automated attacks Proceedings of the 1st International Workshop on Software Protection. pp. 45- 51 ,(2015) , 10.5555/2821429.2821442
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu, LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code computer and communications security. pp. 757- 768 ,(2015) , 10.1145/2810103.2813617
Pascal Junod, Julien Rinaldini, Julie Michielin, Johan Wehrli, Obfuscator-LLVM: software protection for the masses Proceedings of the 1st International Workshop on Software Protection. pp. 3- 9 ,(2015) , 10.5555/2821429.2821434