Transforming malicious code to ROP gadgets for antivirus evasion

C Ntantogian, G Poulios, G Karopoulos… - IET Information …, 2019 - Wiley Online Library
This study advances research in offensive technology by proposing return oriented
programming (ROP) as a means to achieve code obfuscation. The key inspiration is that …

Hiding in the particles: When return-oriented programming meets program obfuscation

P Borrello, E Coppa, DC D'Elia - 2021 51st Annual IEEE/IFIP …, 2021 - ieeexplore.ieee.org
Largely known for attack scenarios, code reuse techniques at a closer look reveal properties
that are appealing also for program obfuscation. We explore the popular return-oriented …

Survey of methods for automated code-reuse exploit generation

AV Vishnyakov, AR Nurmukhametov - Programming and Computer …, 2021 - Springer
This paper provides a survey of methods and tools for automated code-reuse exploit
generation. Such exploits use code that is already contained in a vulnerable program. The …

OCFI: Make Function Entry Identification Hard Again

C Pang, T Zhang, X Xu, L Wang, B Mao - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Function entry identification is a crucial yet challenging task for binary disassemblers that
has been the focus of research in the past decades. However, recent researches show that …

[PDF][PDF] 基于核函数的改进k-means 文本聚类

张国锋, 吴国文 - 计算机应用与软件, 2019 - shcas.net
摘要通过对传统k means 算法优缺点的研究分析, 提出一种改进的k means 聚类算法.
随机初始化k/2 个簇心, 划分最大的簇并删除空簇, 在更新簇心的同时判断簇心位置的合理性; …

COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics

Y Li, F Kang, H Shu, X Xiong, Z Sha… - Security and …, 2022 - Wiley Online Library
As reverse engineering technology develops rapidly, the financial loss caused by software
security issues is urgent. Therefore, how to effectively protect software is a critical problem to …

[PDF][PDF] 基于加权社区检测与增强人工蚁群算法的高维数据特征选择

巫红霞, 谢强 - 计算机应用与软件, 2019 - shcas.net
摘要为了提高高维数据特征选择的时间效率, 降低特征选择的冗余度与不相关性,
提出一种基于加权社区检测与增强人工蚁群算法的高维数据特征选择算法. 设计加权的社区检测 …

[PDF][PDF] 改进的基于底层虚拟机混淆器的指令混淆框架

王雅仪, 刘琛, 黄天波, 文伟平 - 计算机应用, 2023 - pkuexploit.com
(北京大学软件与微电子学院, 北京102600)(* 通信作者电子邮箱weipingwen@ pku. edu. cn)
摘要: 针对底层虚拟机混淆器(ollvm) 在指令混淆层面只支持指令替换一种算法, 且仅支持5 …

Intertwining ROP Gadgets and Opaque Predicates for Robust Obfuscation

F Nakanishi, G De Pasquale, D Ferla, L Cavallaro - 2020 - discovery.ucl.ac.uk
Software obfuscation plays a crucial role in protecting intellectual property in software from
reverse engineering attempts. While some obfuscation techniques originate from the …

Call graph obfuscation and diversification: an approach

M Rodríguez‐Veliz, Y Nuñez‐Musa… - IET Information …, 2020 - Wiley Online Library
Monetary loss due to software piracy nowadays reaches millions. In 2017, the commercial
value for this concept rose to $46.3 billion. A way to mitigate this problem from the …