International audienceAbstract. Runtime code protection techniques are widely used in order to delay reverse code engineering and modify binary signatures. This is a significant problem since virtually every malware sample in the wild is packed and even simple runtime code protection schemes can thwart static analysis. This paper describes a generic technique based on fine-grained trace analysis to automatically detect and classify runtime code protection techniques. This results in easier automatic analysis of the target program and in some cases, such as code packing or encryption, the protection can be fully removed. In other cases, such as code checking and code scrambling, annotations can be provided to static analysis tools to automat...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Despite the growing attention to security concerns and advances in code verification tools, many mem...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
The ability to reverse the most advanced software protection schemes is a critical step in mitigatin...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Static program analysis computes information about a program without executing the program. This can...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
AbstractThe evolution of computer science has exposed us to the growing gravity of security problems...
Computer program analysis refers to the automatic analysis of the behavior of a user defined program...
Malicious code is an increasingly important problem that threatens the security of computer systems....
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Despite the growing attention to security concerns and advances in code verification tools, many mem...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
The ability to reverse the most advanced software protection schemes is a critical step in mitigatin...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Static program analysis computes information about a program without executing the program. This can...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
AbstractThe evolution of computer science has exposed us to the growing gravity of security problems...
Computer program analysis refers to the automatic analysis of the behavior of a user defined program...
Malicious code is an increasingly important problem that threatens the security of computer systems....
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
This paper presents a methodology which combines static analysis and runtime assertion checking in o...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Despite the growing attention to security concerns and advances in code verification tools, many mem...