{AVLeak}: fingerprinting antivirus emulators through {Black-Box} testing J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 58 | 2016 |
Environmental authentication in malware J Blackthorne, B Kaiser, B Fuller, B Yener Progress in Cryptology–LATINCRYPT 2017: 5th International Conference on …, 2019 | 7 | 2019 |
A formal framework for environmentally sensitive malware J Blackthorne, B Kaiser, B Yener Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 6 | 2016 |
Anti-Malware Sandbox Games S Sikdar, S Ruan, Q Han, P Pitimanaaree, J Blackthorne, B Yener, L Xia arXiv preprint arXiv:2202.13520, 2022 | 2 | 2022 |
Flowtables: program skeletal inversion for defeat of interprocedural analysis with unique metamorphism L Jones, R Whelan, J Blackthorne, G Baker Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015 | 2 | 2015 |
Reverse Engineering Anti-Virus Emulators through Black-box Analysis J Blackthorne, B Yener Tech. rep., Computer Science Department, Rensselaer Polytechnic Institute, 2015 | 2 | 2015 |
Out-of-Order Execution as a Cross-VM Side-Channel and Other Applications S d'Antoine, J Blackthorne, B Yener Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 1-11, 2017 | | 2017 |
Obfuscation through the observer-effect: Thinking outside the virtual black-box JL Blackthorne Rensselaer Polytechnic Institute, 2015 | | 2015 |