과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- H. Lim, H. Park, S. Choi, T. Han, "A Static Java Birthmark Based on Control Flow Edges," Proc. of the 33th Annual IEEE Computer Software and Applications Conference (COMPSAC), pp. 413-420, 2009.
- R. Rolles, "Unpacking Virtualization Obfuscators," Proc. of the 3rd USENIX Workshop on Offensive Technologies (WOOT), 2009.
- M. Sharif, A. Lanzi, J. Giffin, W. Lee, "Automatic Reverse Engineering of Malware Emulators," Proc. of the 30th IEEE Symposium on Security and Privacy (SP), pp. 94-109, 2009.
- B. Anckaert, M. H. Jakubowski, R. Venkatesan, "Proteus: Virtualization for Diversified Tamper- Resistance," Proc. of the 6th ACM Workshop on Digital Rights Management (DRM), pp. 47-58, 2006.
- VMProtect Software, VMProtect [Online]. Available: http://vmpsoft.com/
- Oreans Technologies, Code Virtualizer [Online]. Available: http://oreans.com/codevirtualizer.php
- J. Kinder, "Towards Static Analysis of Virtualiza tion-Obfuscated Binaries," Proc. of the 19th Working Conference on Reverse Engineering (WCRE), pp. 61-70, 2012.
- D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, G. Vigna, "Efficient Detection of Split Personalities in Malware," Proc. of the 17th Annual Network and Distributed System Security Symposium (NDSS), 2010.
- M. D. Preda, R. Giacobazzi, S. Debray, K. Coogan, G. M. Townsend, "Modelling Metamorphism by Abstract Interpretation," Proc. of the 17th International Static Analysis Symposium (SAS), LNCS 6337, pp. 218-235, 2010.
- L. Mauborgne, X. Rival, "Trace Partitioning in Abstract Interpretation Based Static Analyzers," Proc. of the 14th European Symposium on Programming (ESOP), LNCS 3444, pp. 5-20, 2005.
- C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, K. Hazelwood, "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation," Proc. of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI), pp. 190- 200, 2005.
- K. Coogan, S. Debray, "Equational Reasoning on x86 Assembly Code," Proc. of the 11th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 75-84, 2011.
- K. Coogan, G. Lu, S. Debray, "Deobfuscatoin of Virtualization-Obfuscated Software: A Semantics- Based Approach," Proc. of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 275-284, 2011.
- C. de la Higuera, Grammatical Inference: Learning Automata and Grammers, Cambridge University Press, 2010.
- C. G. Nevill-Manning, I. H. Witten, "Identifying Hierarchical Structure in Sequences: A linear-time algorithm," Journal of Artificial Intelligence Research (JAIR), Vol. 7, pp. 67-82, 1997.
- J. Bohnet, M. Koeleman, J. Doellner, "Visualizing Massively Pruned Execution Traces to Facilitate Trace Exploration," Proc. of the 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT), pp. 57-64, 2009.
- P. Beaucamps, I. Gnaedig, J.-Y. Marion, "Behavior Abstraction in Malware Analysis," Proc. of the 1st International Conference on Runtime Verification (RV), LNCS 6418, pp. 168-182, 2010.
- D. Brumley, I. Jager, T. Avgerinos, E. J. Schwartz, "BAP: A Binary Analysis Platform," Proc. of the 23th International Conference on Computer Aided Verification (CAV), LNCS 6806, pp. 463-469, 2011.
- G. Balakrishnan, R. Gruian, T. Reps, T. Teitelbaum, "CodeSurfer/x86-A Platform for Analyzing x86 Executables," Proc. of the 14th International Conference on Compiler Construction (CC), LNCS 3443, pp. 250-254, 2005.
- J. Kinder, H. Veith, "Jakstab: A Static Analysis Platform for Binaries," Proc. of the 20th International Conference on Computer Aided Verification (CAV), LNCS 5123, pp. 423-427, 2008.
- J. Kinder, D. Kravchenko, "Alternating Control Flow Reconstruction," Proc. of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), LNCS 7148, pp. 267-282, 2012.
- S. Bardin, P. Herrmann, F. Vedrine, "Refinement- Based CFG Reconstruction from Unstructured Programs," Proc. of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), LNCS 6538, pp. 54- 69, 2011.
- C. Wang, J. Davidson, J. Hill, J. Knight, "Protection of Software-Based Survivability Mechanisms," Proc. of the International Conference on Dependable Systems and Networks (DSN), pp. 193-202, 2001.
- S. K. Udupa, S. K. Debray, M. Madou, "Deobfuscation: Reverse Engineering Obfuscated Code," Proc. of the 12th Working Conference on Reverse Engineering (WCRE), 2005.