Decompilation of binary programs
Software—Practice & Experience
Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Advanced compiler design and implementation
Advanced compiler design and implementation
Dynamic Binary Translation and Optimization
IEEE Transactions on Computers
Profile-guided code compression
PLDI '02 Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Obfuscation of executable code to improve resistance to static disassembly
Proceedings of the 10th ACM conference on Computer and communications security
Exploiting Self-Modification Mechanism for Program Protection
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
Visualizing the Behavior of Dynamically Modifiable Code
IWPC '05 Proceedings of the 13th International Workshop on Program Comprehension
Static analysis of executables to detect malicious patterns
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Static disassembly of obfuscated binaries
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Software protection through dynamic code mutation
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
Robustness to Code and Data Deletion in Autocatalytic Quines
Transactions on Computational Systems Biology X
A self-healing multipath routing protocol
Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Sytems
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Hybrid analysis and control of malware
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Adaptive languages and a new programming style
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Mobile Agent Protection with Self-Modifying Code
Journal of Signal Processing Systems
Shuffling against side-channel attacks: a comprehensive study with cautionary note
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Binary-code obfuscations in prevalent packer tools
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Self-modifying code is notoriously hard to understand and therefore very well suited to hide program internals. In this paper we introduce a program representation for this type of code: the state-enhanced control flow graph. It is shown how this program representation can be constructed, how it can be linearized into a binary program, and how it can be used to generate, analyze and transform self-modifying code.