Malware classification and composition analysis: A survey of recent developments

A Abusitta, MQ Li, BCM Fung - Journal of Information Security and …, 2021 - Elsevier
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Let a thousand flowers bloom? An early look at large numbers of software app developers and patterns of innovation

KJ Boudreau - Organization Science, 2012 - pubsonline.informs.org
In this paper, I study the effect of adding large numbers of producers of application software
programs (“apps”) to leading handheld computer platforms, from 1999 to 2004. To isolate …

Obfuscation of executable code to improve resistance to static disassembly

C Linn, S Debray - Proceedings of the 10th ACM conference on …, 2003 - dl.acm.org
A great deal of software is distributed in the form of executable code. The ability to reverse
engineer such executables can create opportunities for theft of intellectual property via …

Manufacturing cheap, resilient, and stealthy opaque constructs

C Collberg, C Thomborson, D Low - … of the 25th ACM SIGPLAN-SIGACT …, 1998 - dl.acm.org
It has become common to distribute software in forms that are isomorphic to the original
source code. An important example is Java bytecode. Since such codes are easy to …

Java quality assurance by detecting code smells

E Van Emden, L Moonen - Ninth Working Conference on …, 2002 - ieeexplore.ieee.org
Software inspection is a known technique for improving software quality. It involves carefully
examining the code, the design, and the documentation of software and checking these for …

Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection

S Yang, L Cheng, Y Zeng, Z Lang… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Binary code similarity detection is a fundamental technique for many security applications
such as vulnerability search, patch analysis, and malware detection. There is an increasing …

Obfuscation techniques for enhancing software security

CS Collberg, CD Thomborson, DWK Low - US Patent 6,668,325, 2003 - Google Patents
Accordingly, Several techniques for technical protection of Software Secrets are provided in
accordance with one embodiment of the present invention. In the detailed description of the …

Static disassembly of obfuscated binaries

C Kruegel, W Robertson, F Valeur… - USENIX security …, 2004 - usenix.org
Disassembly is the process of recovering a symbolic representation of a program's machine
code instructions from its binary representation. Recently, a number of techniques have …

[图书][B] Modern compiler design

D Grune, K Van Reeuwijk, HE Bal, CJH Jacobs… - 2012 - books.google.com
" Modern Compiler Design" makes the topic of compiler design more accessible by focusing
on principles and techniques of wide application. By carefully distinguishing between the …