Research on deformation based binary code obfuscation technology

被引:0
|
作者
Wang, Huai-Jun [1 ,2 ]
Fang, Ding-Yi [1 ,2 ]
Li, Guang-Hui [1 ,2 ]
Zhang, Cong [1 ,2 ]
Jiang, He [1 ,2 ]
机构
[1] School of Info. Sci. and Technol., Northwest Univ., Xi'an 710127, China
[2] NWU-Irdeto IoT-Info. Security Joint Lab., Xi'an 710127, China
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:14 / 21
相关论文
共 50 条
  • [1] Research Based on LLVM Code Obfuscation Technology
    Lv, Di
    Zhao, Liang
    Chen, Bin
    2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 163 - 167
  • [2] Research on Code Obfuscation Based on Maze Protection Technology
    Wang, Zhiyue
    Wu, Weimin
    Ma, Wenrui
    Li, Jinliang
    Huang, Zhiwei
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1691 - +
  • [3] The Code Obfuscation Technology Based on Class Combination
    Xiang Guangli
    Cai Zheng
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 479 - 483
  • [4] Mimimorphism: A New Approach to Binary Code Obfuscation
    Wu, Zhenyu
    Gianvecchio, Steven
    Xie, Mengjun
    Wang, Haining
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 536 - 546
  • [5] Semantics-based binary code automated de-obfuscation approach
    Guo J.
    Wang L.
    Tang Z.
    Fang D.
    2016, Huazhong University of Science and Technology (44): : 55 - 59
  • [6] Branch Obfuscation Using Binary Code Side Effects
    Lin, Hong
    Zhang, Xiaohua
    Yong, Ma
    Wang, Baohui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 152 - 157
  • [7] Binary Obfuscation Based Reassemble
    Wang, Chang
    Zhang, Zhaolong
    Jia, Xiaoqi
    Tian, Donghai
    PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), 2018, : 153 - 160
  • [8] SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation
    Tang, Zhanyong
    Kuang, Kaiyuan
    Wang, Lei
    Xue, Chao
    Gong, Xiaoqing
    Chen, Xiaojiang
    Fang, Dingyi
    Liu, Jie
    Wang, Zheng
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 261 - 268
  • [9] Fine-Grained Obfuscation Scheme Recognition on Binary Code
    Tian, Zhenzhou
    Mao, Hengchao
    Huang, Yaqian
    Tian, Jie
    Li, Jinrui
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2021, 2022, 441 : 215 - 228
  • [10] SROBR: Semantic Representation of Obfuscation-Resilient Binary Code
    Tang K.
    Shan Z.
    Liu F.
    Huang Y.
    Sun R.
    Qiao M.
    Zhang C.
    Wang J.
    Gui H.
    Wireless Communications and Mobile Computing, 2022, 2022