Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation 2010
DOI: 10.1145/1706356.1706381
|View full text |Cite
|
Sign up to set email alerts
|

Context-sensitive analysis of obfuscated x86 executables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…In order to face this problem, researchers have recently started to consider semantic approaches to malware detection in order to deal with metamorphism, i.e., obfuscation, (e.g., see [9,11,16,29,[26][27][28]32]). …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to face this problem, researchers have recently started to consider semantic approaches to malware detection in order to deal with metamorphism, i.e., obfuscation, (e.g., see [9,11,16,29,[26][27][28]32]). …”
Section: Related Workmentioning
confidence: 99%
“…In [28] the authors propose a methodology for making context-sensitive analysis of assembly programs even when the call and ret instructions are obfuscated. In particular, they define a general framework where they formalize the notion of context-trace semantics.…”
Section: Related Workmentioning
confidence: 99%
“…For example, Shivers' 1CFA allocates distinct contexts for each call site. Lakhotia et al [12] introduce ℓ-contexts to build a static analysis for obfuscated x86 binaries, employing finite sequences of unique enclosed function calls. Finally, one can take a bounded set of naturals {n ∈ N | n ≤ N } for some N as contexts, which will give a good precision for sufficiently big N .…”
Section: Abstracting Over Addressesmentioning
confidence: 99%
“…We believe that our techniques are more precise since we do not abstract the stack. Moreover, the techniques of [18] were only tried on toy examples, they have not been applied for malware detection.…”
Section: Introductionmentioning
confidence: 99%