نتایج جستجو برای: deobfuscation

تعداد نتایج: 38  

2015
Siegfried Rasthofer Steven Arzt Marc Miltenberger Eric Bodden

It is generally a challenging task to tell apart malware from benign applications: obfuscation and string encryption, used by malware as well as goodware, often render static analyses ineffective. In addition, malware frequently tricks dynamic analyses by detecting the execution environment emulated by the analysis tool and then refraining from malicious behavior. In this work, however, we pres...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

2011
Kevin Coogan

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 CHAPTER

2005
Srinivasan Chandrasekharan Saumya Debray

In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines the extent to which current obfuscation techniques succeed in making programs harder to reverse engineer. Our results indicate that many obfuscations, designed to...

2016
Babak Yadegari

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 CHAPTER

2003
Mihai Christodorescu Somesh Jha

Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code ...

Journal: :Comput. J. 2015
Pericle Perazzo Pavel Skvortsov Gianluca Dini

The success of location-based services is growing together with the diffusion of GPS-equipped smart devices. As a consequence, privacy concerns are raising year by year. Location privacy is becoming a major interest in research and industry world, and many solutions have been proposed for it. One of the simplest and most flexible approaches is obfuscation, in which the precision of location dat...

2003
Mihai Christodorescu Somesh Jha

Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code ...

2010
Giacomo Fiumara Massimo Marchi Rosamaria Pagano Alessandro Provetti

A new system for spam e-mail annotation by end-users is presented. It is based on the recursive application of hand-written annotation rules by means of an inferential engine based on Logic Programming. Annotation rules allow the user to express nuanced considerations that depend on deobfuscation, word (non)occurrence and structure of the message in a straightforward, human-readable syntax. We ...

Journal: :Applied sciences 2023

API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of program, the provides important basis analyzing behavior and functionality program. address spaces essential analysts identify call information, therefore obfuscation as protection strategy prevent from obtaining information spaces. avoids aims create more compl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید