Arash Shahkar. ON MATCHING BINARY TO SOURCE CODE
Arjun Shah. Metamorphic Code Generator based on bytecode of LLVM IR
Christoph Erhardt. Design and Implementation of a TriCore Backend for the LLVM Compiler Framework
Daniele Cono D’Elia. Flexible On-Stack Replacement in LLVM
David Menendez. Termination-Checking for LLVM Peephole Optimizations
Eric Schkufza. STOCHASTIC PROGRAM OPTIMIZATION FOR x86 64 BINARIES
Federico Scrinzi. Behavioral Analysis of Obfuscated Code
Johan Fänge. A Tracing JIT Compiler for Erlang
Jozef Cel’uch. Java bytecode disassembler
Linhai Song. Understanding, Detecting, and Diagnosing Real-World Performance Bugs
Pooja Gupta. LLVM Backend Development for ReISC Architecture
Roel Jordans. High-level software-pipelining in LLVM
Simon Andreas Frimann Lund. A High Performance Backend for Array-Oriented Programming on Next-Generation Processing Units
Tilmann Scheller. Where is LLVM being used today
PE file & malware analysis
Alan Martin Sweeney. Malware Analysis & Antivirus Signature Creation
Blake Harrell Anderson. Integrating Multiple Data Views for Improved Malware Analysis
Christian Rossow. Using Malware Analysis to Evaluate Botnet Resilience
Christian Schönbein. PyBox - A Python Sandbox
Christopher B. Harrison. ODinn. An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud
Christos Papadiotis. Enhancing AV-avoidance capabilities of a PE crypter
Dalbir Kaur R. Chhabra. Feature selection and clustering for malicious and benign software characterization
Dan Sinema. AUTOMATED REVERSE ENGINEERING OF MALWARE TO DEVELOP NETWORK SIGNATURES TO MATCH WITH KNOWN NETWORK SIGNATURES
Dimitrios A. Glynos. Packing Heat!
Fadel Omar Shaban. Spyware Detection Using Data Mining for Windows Portable Executable Files
Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas. NOA. AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM
Jani Hakkarainen. Malware Analysis Environment for Windows Targeted Malware
Jarno Niemela. Statistical Analysis Of Malware Defence Methods
Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES
Jiyong Jang. Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code
Jonathan Joseph Blount. Adaptive rule-based malware detection employing learning classifier systems
Katja Hahn. Robust Static Analysis of Portable Executable Malware
Lutz Bohne. Pandora’s Bochs. Automatic Unpacking of Malware
MICHAEL STEPHEN THIEMS. OPTIMIZATION AND EXECUTABLE REGENERATION IN THE IMPACT BINARY REOPTIMIZATION FRAMEWORK
Neel Bavishi. An Executable Packer
Nicholas S. Kovach. Accelerating Malware Detection via a Graphics Processing Unit
PAN-MING. Research on Detecting Mechanism for Trojan horse Based on PE file
Peter Ekstrand Berg. Behavior-based Classification of Botnet Malware
Raja M. Khurram Shahzad. Syed Imran Haider. Detection of Spyware by Mining Executable Files
Ronny Merkel, Tobias Hoppe, Christian Kraetzer, Jana Dittmann. Statistical Detection of Malicious PE-Executables Fast Offline Analysisfor
Shaked Bar. Kuluoz. Malware and botnet analysis
Soon Chai Liang. Understanding behavioural detection of antivirus
Steven Strandlund Hansen. Thor Mark Tampus Larsen. Dynamic Malware Analysis. Detection and Family Classification using Machine Learning
Sverker Nilsson. Heapy. A Memory Profiler and Debugger for Python
Vasileios Pappas. Defending against Return-Oriented Programming
Vishwath R. Mohan. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE
Yaser Alosefer. Analysing Web-based Malware Behaviour through Client Honeypots
Zhiqiang Lin. Reverse Engineering of Data Structures from Binary@Viacheslav78:
Bell Simon. Building a Honeypot to Research Cyber-Attack Techniques.
Bryant R. Adam. UNDERSTANDING HOW REVERSE ENGINEERS MAKE SENSE OF PROGRAMS FROM ASSEMBLY LANGUAGE REPRESENTATIONS.
Cipresso Teodoro. Software reverse engineering education.
Dyrkolbotn Geir Olav. Reverse Engineering Microprocessor Content Using Electromagnetic Radiation.
Fonseca Jose Manuel Rios. Interactive Decompilation.
Garzon Miguel. Reverse Engineering Object-Oriented Systems into Umple. An Incremental and Rule-Based Approach.
Greevy Orla. Enriching Reverse Engineering with Feature Analysis.
Hauke D. Jonathan. Design Verification Using Reverse Engineering.
Holger Michael Kienle. Building Reverse Engineering Tools with Software Components.
Kenny Wong. The Reverse Engineering Notebook.
Lajos Jeno Fülop. Evaluating and Improving Reverse Engineering Tools.
Lin Feifei (Amy). Analysing Reverse Engineering Techniques for Interactive Systems.
Michael Kiperberg. Preventing Reverse Engineering of Native and Managed Programs.
Morando Federico. SOFTWARE REVERSE ENGINEERING AND OPEN SOURCE SOFTWARE. Do we need more FUD to be satiated.
Portillo Sergio Pastrana. Attacks Against Intrusion Detection Networks. Evasion, Reverse Engineering and Optimal Countermeasures.
Prpic Martin. Reverse engineering of Java Card applets.
Ramasubbu Surendranath. Reverse Software Engineering Large Object Oriented Software Systems using the UML Notation.
Rosenblum Nathan E. THE PROVENANCE HIERARCHY OF COMPUTER PROGRAMS.
Shi Nija. Reverse Engineering of Design Patterns from Java Source Code.
UZELAC VLADIMIR. MICROBENCHMARKS AND MECHANISMS FOR REVERSE ENGINEERING OF MODERN BRANCH PREDICTOR UNITS.
Vinju Jurgen Jordanus. Analysis and Transformation of Source Code by Parsing and Rewriting.
Zhiqiang Lin. Reverse Engineering of Data Structures from Binary.
Alam Shahid. A Framework for Metamorphic Malware Analysis and Real-Time Detection.
Alexandre Nuno Vicente Dias. Detecting Computer Viruses using GPUs.
Aniket Kulkarni. Software Protection through Code Obfuscation.
Batchelder R. Michael. JAVA BYTECODE OBFUSCATION.
Bertholon Benoit. Towards Integrity and Software Protection in Cloud Computing Platforms.
Birhanu Mekuria Eshete. Effective Analysis, Characterization, and Detection of Malicious Activities on the Web.
Blaine Alan Nelson. Designing, Implementing, and Analyzing a System for Virus Detection.
Bose Abhijit. Propagation, Detection and Containment of Mobile Malware.
Brian M. Bowen. Design and Analysis of Decoy Systems for Computer Security.
CAPPAERT Jan. Code Obfuscation Techniques for Software Protection.
DAVIDSON RODRIGO BOCCARDO. Context-Sensitive Analysis of x86 Obfuscated Executables.
Drape Stephen. INTELLECTUAL PROPERTY PROTECTION USING OBFUSCATION.
Drape Stephen. Obfuscation of Abstract Data-Types.
Farley, Ryan Joseph. Toward Automated Forensic Analysis of Obfuscated Malware.
Flexeder Andrea. Interprocedural Analysis of Low-Level Code.
Gupta, Divya. Program Obfuscation. Applications and Optimizations.
HILLERT EMILIA.Obfuscate Java bytecode. An evaluation of obfuscating transformations using JBCO.
Javaid Salman. Analysis and Detection of Heap-based Malwares Using Introspection in a Virtualized Environment.
Khaled ElWazeer. DEEP ANALYSIS OF BINARY CODE TO RECOVER PROGRAM STRUCTURE.
Khalid Mohamed Abdelrahman Y Alzarooni. Malware Variant Detection.
Kinder Johannes. Static Analysis of x86 Executables. Statische Analyse von Programmen in x86 Maschinensprache.
Konstantinou Evgenios. Metamorphic Virus. Analysis and Detection.
Lixi Chen. Code Obfuscation Techniques for Software Protection.
Large-Scale Malware Analysis, Detection, and Signature Generation.
Lengyel Tamas Kristof. Malware Collection and Analysis via Hardware Virtualization.
Mayank Varia. Studies in Program Obfuscation.
Mohan R. Vishwath. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE.
Molnar David Alexander. Dynamic Test Generation for Large Binary Programs.
Paleari Roberto. Dealing with next-generation malware.
Paul R. Nathanael. Disk-Level Behavioral Malware Detection.
Povalova Radoslava. Framework for Easy Malware Analysis.
Preda Mila Dalla. Code Obfuscation and Malware Detection by Abstract Interpretation.
Remi Andre B. Valvik. Security API for Java ME. Secure X data.
Richardson Christopher. Virus detection with machine learning.
RIERA FRANCISCO BLAS IZQUIERDO. LO! LLVM Obfuscator An LLVM obfuscator for binary patch generation.
Rompf Tiark. Lightweight Modular Staging and Embedded Compilers. Abstraction without Regret for High-Level High-Performance Programming.
Roundy A. Kevin. HYBRID ANALYSIS AND CONTROL OF MALICIOUS CODE.
Sabu Emmanuel. Software Obfuscation Presentation.
Shakya Sundar Das. Code Obfuscation using Code Splitting with Self-modifying Code.
Sharath K. Udupa, Saumya K. Debray and Matias Madou. Deobfuscation Reverse Engineering Obfuscated Code.
Sharif I. Monirul. ROBUST AND EFFICIENT MALWARE ANALYSIS AND HOST-BASED MONITORING.
SOLODKYY YURIY. SIMPLIFYING THE ANALYSIS OF C++ PROGRAMS.
Solofoarisina Arisoa Randrianasolo. Artficial Intelligence in Computer Security. Detection, Temporary Repair and Defense.
SUN FANGQI. Program Analyses of Web Applications for Detecting Application-Specific Vulnerabilities.
Tian Ronghua. An Integrated Malware Detection and Classification System.
Venkatachalam Sujandharan. DETECTING UNDETECTABLE COMPUTER VIRUSES.
Victor van der Veen. Dynamic Analysis of Android Malware.
Wang Chenxi. A Security Architecture for Survivability Mechanisms.
Wroblewski Gregory. General Method of Program Code Obfuscation (draft).
Написано
Войдите на сайт
Чтобы задать вопрос и получить на него квалифицированный ответ.
Arash Shahkar. ON MATCHING BINARY TO SOURCE CODE
Arjun Shah. Metamorphic Code Generator based on bytecode of LLVM IR
Christoph Erhardt. Design and Implementation of a TriCore Backend for the LLVM Compiler Framework
Daniele Cono D’Elia. Flexible On-Stack Replacement in LLVM
David Menendez. Termination-Checking for LLVM Peephole Optimizations
Eric Schkufza. STOCHASTIC PROGRAM OPTIMIZATION FOR x86 64 BINARIES
Federico Scrinzi. Behavioral Analysis of Obfuscated Code
Johan Fänge. A Tracing JIT Compiler for Erlang
Jozef Cel’uch. Java bytecode disassembler
Linhai Song. Understanding, Detecting, and Diagnosing Real-World Performance Bugs
Pooja Gupta. LLVM Backend Development for ReISC Architecture
Roel Jordans. High-level software-pipelining in LLVM
Simon Andreas Frimann Lund. A High Performance Backend for Array-Oriented Programming on Next-Generation Processing Units
Tilmann Scheller. Where is LLVM being used today
PE file & malware analysis
Alan Martin Sweeney. Malware Analysis & Antivirus Signature Creation
Blake Harrell Anderson. Integrating Multiple Data Views for Improved Malware Analysis
Christian Rossow. Using Malware Analysis to Evaluate Botnet Resilience
Christian Schönbein. PyBox - A Python Sandbox
Christopher B. Harrison. ODinn. An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud
Christos Papadiotis. Enhancing AV-avoidance capabilities of a PE crypter
Dalbir Kaur R. Chhabra. Feature selection and clustering for malicious and benign software characterization
Dan Sinema. AUTOMATED REVERSE ENGINEERING OF MALWARE TO DEVELOP NETWORK SIGNATURES TO MATCH WITH KNOWN NETWORK SIGNATURES
Dimitrios A. Glynos. Packing Heat!
Fadel Omar Shaban. Spyware Detection Using Data Mining for Windows Portable Executable Files
Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas. NOA. AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM
Jani Hakkarainen. Malware Analysis Environment for Windows Targeted Malware
Jarno Niemela. Statistical Analysis Of Malware Defence Methods
Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES
Jiyong Jang. Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code
Jonathan Joseph Blount. Adaptive rule-based malware detection employing learning classifier systems
Katja Hahn. Robust Static Analysis of Portable Executable Malware
Lutz Bohne. Pandora’s Bochs. Automatic Unpacking of Malware
MICHAEL STEPHEN THIEMS. OPTIMIZATION AND EXECUTABLE REGENERATION IN THE IMPACT BINARY REOPTIMIZATION FRAMEWORK
Neel Bavishi. An Executable Packer
Nicholas S. Kovach. Accelerating Malware Detection via a Graphics Processing Unit
PAN-MING. Research on Detecting Mechanism for Trojan horse Based on PE file
Peter Ekstrand Berg. Behavior-based Classification of Botnet Malware
Raja M. Khurram Shahzad. Syed Imran Haider. Detection of Spyware by Mining Executable Files
Ronny Merkel, Tobias Hoppe, Christian Kraetzer, Jana Dittmann. Statistical Detection of Malicious PE-Executables Fast Offline Analysisfor
Shaked Bar. Kuluoz. Malware and botnet analysis
Soon Chai Liang. Understanding behavioural detection of antivirus
Steven Strandlund Hansen. Thor Mark Tampus Larsen. Dynamic Malware Analysis. Detection and Family Classification using Machine Learning
Sverker Nilsson. Heapy. A Memory Profiler and Debugger for Python
Vasileios Pappas. Defending against Return-Oriented Programming
Vishwath R. Mohan. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE
Yaser Alosefer. Analysing Web-based Malware Behaviour through Client Honeypots
Zhiqiang Lin. Reverse Engineering of Data Structures from Binary@Viacheslav78: