11th Working Conference on Reverse Engineering 2004
DOI: 10.1109/wcre.2004.24
|View full text |Cite
|
Sign up to set email alerts
|

Imposing order on program statements to assist anti-virus scanners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…In contrast, many of the other approaches to detection, perhaps with the exception of the work by Christodorescu et al [6], are informal. For example, in control-flow analysis (e.g., [17,14]), the flow of control is extracted from a program based on an implicit assumption about the way that looping instructions work, i.e., they update the value of the instruction pointer. Based on this assumption, the control-flow graph is constructed.…”
Section: Formal and Informal Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…In contrast, many of the other approaches to detection, perhaps with the exception of the work by Christodorescu et al [6], are informal. For example, in control-flow analysis (e.g., [17,14]), the flow of control is extracted from a program based on an implicit assumption about the way that looping instructions work, i.e., they update the value of the instruction pointer. Based on this assumption, the control-flow graph is constructed.…”
Section: Formal and Informal Approachesmentioning
confidence: 99%
“…For example, the approach of Lakhotia and Mohammed to control-and data-flow analysis resulted in a rewritten version of a program called a zero form [17,14]. The specification of Intel 64 could be used to prove the equivalence of the original program and its zero form through dynamic analysis in manner of Section 3.…”
Section: Formal and Informal Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…More general approaches, similar in intent to ours, attempt to normalize C programs by ordering program statements and expressions [40] and to apply compiler-optimization techniques to eliminate obfuscated code [41,42]. These algorithms complement ours as they perform local deobfuscation.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, 9 of 13 CERT advisories from 1998 involved buffer overflows [1] and in 1999, they accounted for at least 50% of advisories issued by CERT [2]. Several papers presenting reverse engineering and transformations that relate to security have been presented at recent WCRE conferences [22,24,25,26,27].…”
Section: Introductionmentioning
confidence: 99%