Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007. ,
DOI : 10.1109/ACSAC.2007.21
Address obfuscation: an efficient approach to combat a broad range of memory error exploits, Proc. of USENIX Security Symp, pp.105-120, 2003. ,
A taxonomy of obfuscating transformations, 1997. ,
Computing range queries on obfuscated data, Proc. of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2004. ,
Structural comparison of executable objects, Proc. of the Conf. DIMVA, pp.161-173, 2004. ,
Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation, Static Analysis Symposium, pp.129-145 ,
DOI : 10.1007/978-3-642-33125-1_11
Automatic binary deobfuscation, Journal in Computer Virology, vol.2, issue.2, pp.261-276, 2010. ,
DOI : 10.1007/s11416-009-0126-4
Cache aware data layout reorganization optimization in GCC, Proc. of the GCC Developers' Summit, 2005. ,
Polymorphing Software by Randomizing Data Structure Layout, Proc. of the Conf. DIMVA, pp.107-126, 2009. ,
DOI : 10.1007/978-3-540-87403-4_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.4174
Pin, ACM SIGPLAN Notices, vol.40, issue.6, pp.190-200, 2005. ,
DOI : 10.1145/1064978.1065034
On Evaluating Obfuscatory Strength of Alias-based Transforms using Static Analysis, 2006 International Conference on Advanced Computing and Communications, pp.605-610, 2006. ,
DOI : 10.1109/ADCOM.2006.4289963