Bypassing Malware Obfuscation with Dynamic Synthesis

被引:0
|
作者
Biondi, Fabrizio [1 ]
Josse, Sebastien [1 ]
Legay, Axel [1 ]
机构
[1] Inria, Rocquencourt, France
来源
ERCIM NEWS | 2016年 / 106期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Black-box synthesis is more efficient than SMT deobfuscation on predicates obfuscated with Mixed-Boolean Arithmetics.
引用
收藏
页码:37 / +
页数:2
相关论文
共 50 条
  • [1] Obfuscation: The Hidden Malware
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 41 - 47
  • [2] Use of cryptography in malware obfuscation
    Asghar, Hassan Jameel
    Zhao, Benjamin Zi Hao
    Ikram, Muhammad
    Nguyen, Giang
    Kaafar, Dali
    Lamont, Sean
    Coscia, Daniel
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 135 - 152
  • [3] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
  • [4] Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis
    Bacci, Alessandro
    Bartoli, Alberto
    Martinelli, Fabio
    Medvet, Eric
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 379 - 385
  • [5] Proposed Classification of Malware, Based on Obfuscation
    Barria, Cristian
    Cubillos, Claudio
    Cordero, David
    Palma, Miguel
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44
  • [6] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [7] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
    Koutsokostas, Vasilios
    Patsakis, Constantinos
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
  • [8] Malware Obfuscation Measuring via Evolutionary Similarity
    Li, Jian
    Xu, Jun
    Xu, Ming
    Zhao, HengLi
    Zheng, Ning
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
  • [9] Malware Obfuscation Detection via Maximal Patterns
    Li, Jian
    Xu, Ming
    Zheng, Ning
    Xu, Jian
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 324 - 328
  • [10] A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
    Alrammal, Muath
    Naveed, Munir
    Sallam, Suzan
    Tsaramirsis, Georgios
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1651 - 1661