注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly
作者: Yu-Jye Tung , Ian G. Harris
DOI:
10.14722/BAR.2020.23004
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
0
下载资源
2
doi.org
UNKNOWN
下载加速
sci-hub.st
HTML
下载加速
参考文章
(27)
1.
David Brumley, Ivan Jager, Thanassis Avgerinos, Edward J. Schwartz,
BAP: a binary analysis platform
computer aided verification.
pp. 463- 469 ,(2011) ,
10.1007/978-3-642-22110-1_37
2.
Adel Djoudi, Sébastien Bardin,
BINSEC: Binary Code Analysis with Low-Level Regions
Tools and Algorithms for the Construction and Analysis of Systems.
pp. 212- 217 ,(2015) ,
10.1007/978-3-662-46681-0_17
3.
A. von Mayrhauser, A.M. Vans,
From code understanding needs to reverse engineering tool capabilities
CASE.
pp. 230- 239 ,(1993) ,
10.1109/CASE.1993.634824
4.
Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi,
Opaque predicates detection by abstract interpretation
algebraic methodology and software technology.
,vol. 4019, pp. 81- 95 ,(2006) ,
10.1007/11784180_9
5.
Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray,
A Generic Approach to Automatic Deobfuscation of Executable Code
2015 IEEE Symposium on Security and Privacy.
pp. 674- 691 ,(2015) ,
10.1109/SP.2015.47
6.
Fredrik Valeur, Christopher Kruegel, Giovanni Vigna, William Robertson,
Static disassembly of obfuscated binaries
usenix security symposium.
pp. 18- 18 ,(2004)
7.
Christian Collberg, Douglas Low, C. Thomborson,
A Taxonomy of Obfuscating Transformations
Department of Computer Science, The University of Auckland, New Zealand.
,(1997)
8.
Sebastian Banescu, Alexander Pretschner, Martin Ochoa,
A framework for measuring software obfuscation resilience against automated attacks
Proceedings of the 1st International Workshop on Software Protection.
pp. 45- 51 ,(2015) ,
10.5555/2821429.2821442
9.
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu,
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
computer and communications security.
pp. 757- 768 ,(2015) ,
10.1145/2810103.2813617
10.
Pascal Junod, Julien Rinaldini, Julie Michielin, Johan Wehrli,
Obfuscator-LLVM: software protection for the masses
Proceedings of the 1st International Workshop on Software Protection.
pp. 3- 9 ,(2015) ,
10.5555/2821429.2821434
来源期刊
Proceedings 2020 Workshop on Binary Analysis Research
Internet Society
2020 年,
Volume: , Issue: ,
Page:
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...