Master's thesis describes imported functions detection in PE executables, which are from static libraries. Main reason is process automatization and analysis simplification. Detection is solved by searching prepared patterns with missmatch tolerance. Missmatch are caused by changing address during building application. Resulting application supports compiler detection and it contains patterns for MinGW32, Visual studio 2005 and C++ Builder 6
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presen...
In today’s university life, teachers are often confronted with plagiarism. A special form of plagiar...
International audienceClone detection is usually applied in the context of detecting small-to medium...
Re-engineering from legacy executable (binary) files is greatly facilitated by identifying and namin...
The objective of this work is a creation of compiler detector. This program can recognize compiler o...
A method for efficiently generating signatures for detecting library functions in executable files i...
Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods ...
Program build information, such as compilers and li-braries used, is vitally important in an auditin...
Abstract. In safety-critical and high-reliability systems, software development and maintenance are ...
The ability to monitor when user code invokes a library function offers numerous advantages. For exa...
Different software tools, such as decompilers, code quality analyzers, recognizers of packed executa...
This paper presents a technique to derive and implement error detectors to protect an application fr...
This thesis looks into automatic detection of security related code in order to eliminate this probl...
Artificial Intelligence (AI) and Machine Learning (ML) are pervasive in the current computer science...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presen...
In today’s university life, teachers are often confronted with plagiarism. A special form of plagiar...
International audienceClone detection is usually applied in the context of detecting small-to medium...
Re-engineering from legacy executable (binary) files is greatly facilitated by identifying and namin...
The objective of this work is a creation of compiler detector. This program can recognize compiler o...
A method for efficiently generating signatures for detecting library functions in executable files i...
Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods ...
Program build information, such as compilers and li-braries used, is vitally important in an auditin...
Abstract. In safety-critical and high-reliability systems, software development and maintenance are ...
The ability to monitor when user code invokes a library function offers numerous advantages. For exa...
Different software tools, such as decompilers, code quality analyzers, recognizers of packed executa...
This paper presents a technique to derive and implement error detectors to protect an application fr...
This thesis looks into automatic detection of security related code in order to eliminate this probl...
Artificial Intelligence (AI) and Machine Learning (ML) are pervasive in the current computer science...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presen...
In today’s university life, teachers are often confronted with plagiarism. A special form of plagiar...
International audienceClone detection is usually applied in the context of detecting small-to medium...