-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathreferences.bib
More file actions
77 lines (70 loc) · 2.6 KB
/
references.bib
File metadata and controls
77 lines (70 loc) · 2.6 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
@book{1566145,
author={S. K. {Udupa} and S. K. {Debray} and M. {Madou}},
booktitle={12th Working Conference on Reverse Engineering (WCRE'05)},
title={Deobfuscation: reverse engineering obfuscated code},
year={2005},
volume={},
number={},
pages={10 pp.-54},
doi={10.1109/WCRE.2005.13}
}
@article{articleOpensource,
author = {Hoepman, Jaap-Henk and Jacobs, Bart},
year = {2008},
month = {02},
pages = {},
title = {Increased security through open source},
volume = {50},
journal = {Communications of the ACM},
doi = {10.1145/1188913.1188921}
}
@book{MalwareAnalysis,
title = {Malware Analysis Static and Dynamic Slide},
author = {Mario Polino}
}
@book{paperInstrumentation,
author="Polino, Mario
and Continella, Andrea
and Mariani, Sebastiano
and D'Alessio, Stefano
and Fontana, Lorenzo
and Gritti, Fabio
and Zanero, Stefano",
editor="Polychronakis, Michalis
and Meier, Michael",
title="Measuring and Defeating Anti-Instrumentation-Equipped Malware",
booktitle="Detection of Intrusions and Malware, and Vulnerability Assessment",
year="2017"
}
@book{SlidePackers,
title = {Packers and Evasive Techniques Slide},
author = {Mario Polino}
}
@book{SlideReverse,
title = {Reverse Egineering Slide},
author = {Mario Polino}
}
@book{LessonReverse,
title = {Reverse Egineering Lesson},
author = {Liam O’Brien},
url = {https://www.cs.cmu.edu/~aldrich/courses/654-sp05/handouts/MSE-RevEng-05.pdf},
}
@article{packer,
author = {Roundy, Kevin A. and Miller, Barton P.},
title = {Binary-Code Obfuscations in Prevalent Packer Tools},
year = {2013},
issue_date = {October 2013},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {46},
number = {1},
issn = {0360-0300},
url = {https://doi.org/10.1145/2522968.2522972},
doi = {10.1145/2522968.2522972},
abstract = {The first steps in analyzing defensive malware are understanding what obfuscations are present in real-world malware binaries, how these obfuscations hinder analysis, and how they can be overcome. While some obfuscations have been reported independently, this survey consolidates the discussion while adding substantial depth and breadth to it. This survey also quantifies the relative prevalence of these obfuscations by using the Dyninst binary analysis and instrumentation tool that was recently extended for defensive malware analysis. The goal of this survey is to encourage analysts to focus on resolving the obfuscations that are most prevalent in real-world malware.},
journal = {ACM Comput. Surv.},
month = jul,
articleno = {4},
numpages = {32},
keywords = {Malware, program binary analysis, obfuscation}
}