Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813627
|View full text |Cite
|
Sign up to set email alerts
|

CoDisasm

Abstract: Fighting malware involves analyzing large numbers of suspicious binary files. In this context, disassembly is a crucial task in malware analysis and reverse engineering. It involves the recovery of assembly instructions from binary machine code. Correct disassembly of binaries is necessary to produce a higher level representation of the code and thus allow the analysis to develop high-level understanding of its behavior and purpose. Nonetheless, it can be problematic in the case of malicious code, as malware w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 41 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…We also compare BareUnpack's result with other representative generic unpacking tools: PolyUnpack [3], Renovo [4], OmniUnpack [5], CoDisasm [17] and PINdemonium [18]. All of them are relying on some simulated environments.…”
Section: Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…We also compare BareUnpack's result with other representative generic unpacking tools: PolyUnpack [3], Renovo [4], OmniUnpack [5], CoDisasm [17] and PINdemonium [18]. All of them are relying on some simulated environments.…”
Section: Datasetmentioning
confidence: 99%
“…PolyUnpack [3], Renovo [4], OmniUnpack [5] CoDisasm [17] and PINdemonium [18] are the most notably generic unpacking approaches. Table 6 illustrates the various simulated environments applied by these approaches.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation