Proceedings of the 18th ACM Conference on Computer and Communications Security 2011
DOI: 10.1145/2046707.2046739
|View full text |Cite
|
Sign up to set email alerts
|

Deobfuscation of virtualization-obfuscated software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 100 publications
(78 citation statements)
references
References 7 publications
0
77
0
1
Order By: Relevance
“…Coogan et al have developed a scheme which focuses on identifying the flow of values to system call instructions used by the malware, thereby obviating the need to analyze VM instructions [15]. However, their scheme does not produce encouraging results when applied to complex applications.…”
Section: Related Workmentioning
confidence: 99%
“…Coogan et al have developed a scheme which focuses on identifying the flow of values to system call instructions used by the malware, thereby obviating the need to analyze VM instructions [15]. However, their scheme does not produce encouraging results when applied to complex applications.…”
Section: Related Workmentioning
confidence: 99%
“…To perform specialization for interprocedural partialevaluation, the following lines are added after line [16] In addition, Alg. 3 takes an additional argument, specializedCFGs, which is a map whose entries are of the form CFG, ρ → ρ , where ρ is a partial static pre-store and ρ is a partial static post-store.…”
Section: Specializationmentioning
confidence: 99%
“…System invocation is the interface between application software and operation systems, almost all functions of application software are implemented by system invocations. Kevin and Wang [5,6] claim that most malicious behaviors caused by malicious code are resulted from redirection of normal execution to certain malicious instructions, which was previous designed by attracter and injected in certain memory space, such as buffer leakage. By using the trace of taint data, certain malicious behaviors can be sketched and reoccur, in order to represent how certain system calls are illegally used to achieve certain unauthorized goals.…”
Section: Related Workmentioning
confidence: 99%