2009 2nd International Conference on Computer, Control and Communication 2009
DOI: 10.1109/ic4.2009.4909168
|View full text |Cite
|
Sign up to set email alerts
|

Generic unpacking techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Packing compresses and/or encrypts the program code in such way, that actual code stays hidden till runtime (when the executable is unpacked) making it immune to static analysis [7]. Packed program contains additional code, which dynamically unpacks or generates original program code in memory and then transfer control to it.…”
Section: Additional Protection Methods For Dongle-based Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Packing compresses and/or encrypts the program code in such way, that actual code stays hidden till runtime (when the executable is unpacked) making it immune to static analysis [7]. Packed program contains additional code, which dynamically unpacks or generates original program code in memory and then transfer control to it.…”
Section: Additional Protection Methods For Dongle-based Protectionmentioning
confidence: 99%
“…Since every packer has its associated unpacker to undo packing, a successful generic unpacker is difficult to come by [7]. Packing is considered as one of the best protection against reverse engineering, because it can combine other protection methods mentioned above: antidebugging, code obfuscation, etc.…”
Section: Additional Protection Methods For Dongle-based Protectionmentioning
confidence: 99%
“…Dynamic unpacking approaches monitor the execution of a binary in order to extract its actual code. These methods execute the samples inside an isolated environment that can be deployed as a virtual machine or an emulator [3]. The execution is traced and stopped when certain events occur.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Artificial Intelligence and data mining algorithms have been applied as malicious detection methods and for the discovery of new malware patterns [15]. In the research effort of Babar and Khalid [3], boosted decision trees working on n-grams are found to produce better results than Naive Bayes classifiers and Support Vector Machines (SVM). Ye et al, [16] use automatic extraction of association rules on Windows API execution sequences to distinguish between malware and clean program files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This isolated environment can be deployed as a virtual machine or an emulator [1]. Then, the execution is traced and stopped when certain events occur.…”
Section: Introductionmentioning
confidence: 99%