A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
Detecting environment-sensitive malware
M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
Code obfuscation against symbolic execution attacks
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …
malware writers to hamper program analysis. However, there seems to be little work on …
[PDF][PDF] Digital rights management for content distribution
Q Liu, R Safavi-Naini, NP Sheppard - Conferences in Research and …, 2003 - Citeseer
Transferring the traditional business model for selling digital goods linked to physical media
to the online world leads to the need for a system to protect digital intellectual property …
to the online world leads to the need for a system to protect digital intellectual property …
[PDF][PDF] Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
M Alazab, S Venkatraman, PA Watters, M Alazab - AusDM, 2011 - academia.edu
Zero-day or unknown malware are created using code obfuscation techniques that can
modify the parent code to produce offspring copies which have the same functionality but …
modify the parent code to produce offspring copies which have the same functionality but …
Profiling and classifying the behavior of malicious codes
M Alazab - Journal of Systems and Software, 2015 - Elsevier
Malware is a major security threat confronting computer systems and networks and has
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …
Oblivious hashing: A stealthy software integrity verification primitive
Y Chen, R Venkatesan, M Cary, R Pang… - Information Hiding: 5th …, 2003 - Springer
We describe a novel software verification primitive called Oblivious Hashing. Unlike
previous techniques that mainly verify the static shape of code, this primitive allows implicit …
previous techniques that mainly verify the static shape of code, this primitive allows implicit …
Cyber-physical systems: A security perspective
A cyber-physical system (CPS) is a composition of independently interacting components,
including computational elements, communications and control systems. Applications of …
including computational elements, communications and control systems. Applications of …