Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Binary-code obfuscations in prevalent packer tools

KA Roundy, BP Miller - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
The first steps in analyzing defensive malware are understanding what obfuscations are
present in real-world malware binaries, how these obfuscations hinder analysis, and how …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - Network and …, 2020 - par.nsf.gov
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers

X Ugarte-Pedrero, D Balzarotti, I Santos… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Run-time packers are often used by malware-writers to obfuscate their code and hinder
static analysis. The packer problem has been widely studied, and several solutions have …

Codisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions

G Bonfante, J Fernandez, JY Marion, B Rouxel… - Proceedings of the …, 2015 - dl.acm.org
Fighting malware involves analyzing large numbers of suspicious binary files. In this context,
disassembly is a crucial task in malware analysis and reverse engineering. It involves the …

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

M Ollivier, S Bardin, R Bonichon… - Proceedings of the 35th …, 2019 - dl.acm.org
Code obfuscation is a major tool for protecting software intellectual property from attacks
such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks …

Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost

B Cheng, J Ming, J Fu, G Peng, T Chen… - Proceedings of the …, 2018 - dl.acm.org
Binary packing, encoding binary code prior to execution and decoding them at run time, is
the most common obfuscation adopted by malware authors to camouflage malicious code …

Malware and machine learning

C LeDoux, A Lakhotia - Intelligent Methods for Cyber Warfare, 2014 - Springer
Abstract Malware analysts use Machine Learning to aid in the fight against the unstemmed
tide of new malware encountered on a daily, even hourly, basis. The marriage of these two …

Identifying shared software components to support malware forensics

B Ruttenberg, C Miles, L Kellogg, V Notani… - Detection of Intrusions …, 2014 - Springer
Recent reports from the anti-malware industry indicate similarity between malware code
resulting from code reuse can aid in developing a profile of the attackers. We describe a …

Dynamic self-protection and tamperproofing for android apps using native code

M Protsenko, S Kreuter, T Müller - 2015 10th International …, 2015 - ieeexplore.ieee.org
With over one billion sold devices, representing 80% market share, Android remains the
most popular platform for mobile devices. Application piracy on this platform is a major …