1 |
Johannes Kinder, "Towards static analysis of virtualization obfuscated binaries," In 2012 19th Working Conference on Reverse Engineering. IEEE, pp.61-70, 2012
|
2 |
Jasvir Nagra and Christian Collberg, "Surreptitious Software: Obfuscation, Watermarking, and Tamper proofing for Software Protection," Pearson Education, 2009.
|
3 |
Rolf Rolles, "Unpacking Virtualization Obfuscators," In Proceedings of the 3rd USENIX Conference on Offensive Technologies(WOOT'09), USENIX, 2009.
|
4 |
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, and Wenke Lee, "Automatic Reverse Engineering of Malware Emulators," In 30th IEEE Symposium on Security and Privacy (S&P 2009), May 2009
|
5 |
Hiralal Agrawal and Joseph R Horgan, "Dynamic program slicing," In ACM SIGPlan Notices, Vol. 25. ACM, pp.246-256, 2009.
|
6 |
Bertrand Anckaert, Mariusz Jakubowski, and Ramarathnam Venkatesan, "Proteus: virtualization for diversified tamperresistance," In Proceedings of the ACM workshop on Digital rights management. ACM, pp.47-58, 2007.
|
7 |
Choi Do-Hyeon, Jung Oh Park, ' A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm', The Journal of The Institute of Internet, Broadcasting and Communication VOL. 16 No. 6, 2016
|