2021
DOI: 10.1007/978-3-030-89432-0_1
|View full text |Cite
|
Sign up to set email alerts
|

LOM: Lightweight Classifier for Obfuscation Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…It can construct general logical formulas representing the intrinsic characteristics of opaque predicates through the symbolic execution of trace, and use constraint solvers to solve these formulas to determine whether they contain opaque predicates. For obfuscated code classification, Kim et al [7] directly uses the histogram of the opcode to classify the obfuscation technology according to the frequency of different opcodes.…”
Section: Introductionmentioning
confidence: 99%
“…It can construct general logical formulas representing the intrinsic characteristics of opaque predicates through the symbolic execution of trace, and use constraint solvers to solve these formulas to determine whether they contain opaque predicates. For obfuscated code classification, Kim et al [7] directly uses the histogram of the opcode to classify the obfuscation technology according to the frequency of different opcodes.…”
Section: Introductionmentioning
confidence: 99%
“…It can construct general logical formulas representing the intrinsic characteristics of opaque predicates through the symbolic execution of trace, and use constraint solvers to solve these formulas to determine whether they contain opaque predicates. For obfuscated code classification, Kim et al [9] directly used the histogram of the opcode to classify the obfuscation technology according to the frequency of different opcodes.…”
Section: Introductionmentioning
confidence: 99%