최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지 = Journal of KIISE, v.42 no.1, 2015년, pp.44 - 53
황준형 (한국과학기술원 전산학과) , 한태숙 (한국과학기술원 전산학과)
Control flow information is useful in the analysis and comparison of programs. Virtualization-obfuscation hides control structures of the original program by transforming machine instructions into bytecode. Direct examination of the resulting binary reveals only the structure of the interpreter. Rec...
H. Lim, H. Park, S. Choi, T. Han, "A Static Java Birthmark Based on Control Flow Edges," Proc. of the 33th Annual IEEE Computer Software and Applications Conference (COMPSAC), pp. 413-420, 2009.
R. Rolles, "Unpacking Virtualization Obfuscators," Proc. of the 3rd USENIX Workshop on Offensive Technologies (WOOT), 2009.
M. Sharif, A. Lanzi, J. Giffin, W. Lee, "Automatic Reverse Engineering of Malware Emulators," Proc. of the 30th IEEE Symposium on Security and Privacy (SP), pp. 94-109, 2009.
B. Anckaert, M. H. Jakubowski, R. Venkatesan, "Proteus: Virtualization for Diversified Tamper- Resistance," Proc. of the 6th ACM Workshop on Digital Rights Management (DRM), pp. 47-58, 2006.
VMProtect Software, VMProtect [Online]. Available: http://vmpsoft.com/
Oreans Technologies, Code Virtualizer [Online]. Available: http://oreans.com/codevirtualizer.php
J. Kinder, "Towards Static Analysis of Virtualiza tion-Obfuscated Binaries," Proc. of the 19th Working Conference on Reverse Engineering (WCRE), pp. 61-70, 2012.
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, G. Vigna, "Efficient Detection of Split Personalities in Malware," Proc. of the 17th Annual Network and Distributed System Security Symposium (NDSS), 2010.
M. D. Preda, R. Giacobazzi, S. Debray, K. Coogan, G. M. Townsend, "Modelling Metamorphism by Abstract Interpretation," Proc. of the 17th International Static Analysis Symposium (SAS), LNCS 6337, pp. 218-235, 2010.
L. Mauborgne, X. Rival, "Trace Partitioning in Abstract Interpretation Based Static Analyzers," Proc. of the 14th European Symposium on Programming (ESOP), LNCS 3444, pp. 5-20, 2005.
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, K. Hazelwood, "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation," Proc. of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI), pp. 190- 200, 2005.
K. Coogan, S. Debray, "Equational Reasoning on x86 Assembly Code," Proc. of the 11th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 75-84, 2011.
K. Coogan, G. Lu, S. Debray, "Deobfuscatoin of Virtualization-Obfuscated Software: A Semantics- Based Approach," Proc. of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 275-284, 2011.
C. de la Higuera, Grammatical Inference: Learning Automata and Grammers, Cambridge University Press, 2010.
C. G. Nevill-Manning, I. H. Witten, "Identifying Hierarchical Structure in Sequences: A linear-time algorithm," Journal of Artificial Intelligence Research (JAIR), Vol. 7, pp. 67-82, 1997.
J. Bohnet, M. Koeleman, J. Doellner, "Visualizing Massively Pruned Execution Traces to Facilitate Trace Exploration," Proc. of the 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT), pp. 57-64, 2009.
P. Beaucamps, I. Gnaedig, J.-Y. Marion, "Behavior Abstraction in Malware Analysis," Proc. of the 1st International Conference on Runtime Verification (RV), LNCS 6418, pp. 168-182, 2010.
D. Brumley, I. Jager, T. Avgerinos, E. J. Schwartz, "BAP: A Binary Analysis Platform," Proc. of the 23th International Conference on Computer Aided Verification (CAV), LNCS 6806, pp. 463-469, 2011.
G. Balakrishnan, R. Gruian, T. Reps, T. Teitelbaum, "CodeSurfer/x86-A Platform for Analyzing x86 Executables," Proc. of the 14th International Conference on Compiler Construction (CC), LNCS 3443, pp. 250-254, 2005.
J. Kinder, H. Veith, "Jakstab: A Static Analysis Platform for Binaries," Proc. of the 20th International Conference on Computer Aided Verification (CAV), LNCS 5123, pp. 423-427, 2008.
J. Kinder, D. Kravchenko, "Alternating Control Flow Reconstruction," Proc. of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), LNCS 7148, pp. 267-282, 2012.
S. Bardin, P. Herrmann, F. Vedrine, "Refinement- Based CFG Reconstruction from Unstructured Programs," Proc. of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), LNCS 6538, pp. 54- 69, 2011.
C. Wang, J. Davidson, J. Hill, J. Knight, "Protection of Software-Based Survivability Mechanisms," Proc. of the International Conference on Dependable Systems and Networks (DSN), pp. 193-202, 2001.
S. K. Udupa, S. K. Debray, M. Madou, "Deobfuscation: Reverse Engineering Obfuscated Code," Proc. of the 12th Working Conference on Reverse Engineering (WCRE), 2005.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.