Sciweavers

84 search results - page 4 / 17
» Zero-Knowledge and Code Obfuscation
Sort
View
IWPC
2006
IEEE
14 years 1 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
NDSS
2008
IEEE
14 years 1 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 2 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
WONS
2012
IEEE
12 years 2 months ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...
WORM
2003
13 years 8 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...