Linear Obfuscation to Combat Symbolic Execution
Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. We propose a novel automatic malware obfuscation...
Saved in:
Main Authors: | WANG, Zhi, Ming, Jiang, Jia, Chunfu, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2005 https://ink.library.smu.edu.sg/context/sis_research/article/3004/viewcontent/esorics11.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Control Flow Obfuscation using Neural Network to Fight Concolic Testing
by: Ma, Haoyu, et al.
Published: (2014) -
DynOpVm: VM-based software obfuscation with dynamic opcode mapping
by: CHENG, Xiaoyang, et al.
Published: (2019) -
Integrated software fingerprinting via neural-network-based control flow obfuscation
by: MA, Haoyu, et al.
Published: (2016) -
KRover: A symbolic execution engine for dynamic kernel analysis
by: PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi, et al.
Published: (2023) -
On the effectiveness of code-reuse-based Android application obfuscation
by: TANG, Xiaoxiao, et al.
Published: (2017)