Pandora's bochs: Automatic unpacking of malware, 2008. ,
Efficient, Transparent, and Comprehensive Runtime Code Manipulation, 2004. ,
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.721-728, 2010. ,
DOI : 10.1109/AINA.2010.121
Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, p.206, 2007. ,
DOI : 10.1145/1273463.1273490
Ether, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.51-62, 2008. ,
DOI : 10.1145/1455770.1455779
Anti-unpacker tricks, Proc. of the 2nd International CARO Workshop, 2008. ,
Partial evaluation of computation process ? an approach to a compilercompiler, Higher-Order and Symbolic Computation, pp.381-391, 1999. ,
A Study of the Packer Problem and Its Solutions, Recent Advances in Intrusion Detection, pp.98-115, 2008. ,
DOI : 10.1007/978-3-540-87403-4_6
Partial evaluation and automatic program generation, 1993. ,
Secure and advanced unpacking using computer emulation, Journal in Computer Virology, vol.3, issue.3, pp.221-236, 2007. ,
DOI : 10.1007/s11416-007-0046-0
Renovo, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, p.53, 2007. ,
DOI : 10.1145/1314389.1314399
Pin: building customized program analysis tools with dynamic instrumentation, PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.190-200, 2005. ,
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.431-441, 2007. ,
DOI : 10.1109/ACSAC.2007.15
Exploring Multiple Execution Paths for Malware Analysis, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.231-245, 2007. ,
DOI : 10.1109/SP.2007.17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.2410
Verified just-in-time compiler on x86, ACM SIGPLAN Notices, vol.45, issue.1, pp.107-118, 2010. ,
DOI : 10.1145/1707801.1706313
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium, 2005. ,
Representation-based just-in-time specialization and the psyco prototype for python PLAN symposium on Partial evaluation and semantics-based program manipulation, Proceedings of the 2004 ACM SIG, pp.15-26, 2004. ,
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.289-300, 2006. ,
DOI : 10.1109/ACSAC.2006.38
BitBlaze: A New Approach to Computer Security via Binary Analysis, Information Systems Security, pp.1-25, 2008. ,
DOI : 10.1007/978-3-540-73368-3_52
Humpand-dump: efficient generic unpacking using an ordered address execution histogram, 2008. ,
The art of computer virus research and defense, 2005. ,
A survey of program slicing techniques, Journal of programming languages, vol.3, issue.3, pp.121-189, 1995. ,
Cross site scripting prevention with dynamic data tainting and static analysis, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2007. ,
Panorama, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, p.127, 2007. ,
DOI : 10.1145/1315245.1315261