Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Control flow obfuscation with information flow tracking
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
binOb+: a framework for potent and stealthy binary obfuscation
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Self destructive tamper response for software protection
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
SPAD: software protection through anti-debugging using hardware virtualization
Proceedings of the 2011 ACM Symposium on Applied Computing
Retooling and securing systemic debugging
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Hi-index | 0.00 |
This column presents the reverse engineering battle from an anti-debugging perspective.