Back to Results
First PageMeta Content
Symbolic execution / Software engineering / Programming language implementation / Malware / Algorithm / Assembly language / KeY / Computer program / Software bug / Computing / Formal methods / Abstract interpretation


BitScope: Automatically Dissecting Malicious Binaries David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang James Newsome, Pongsin Poosankam, Dawn Song, Heng Yin March 18, 2007 Last Modified: May 23, 2007 CMU-CS-07-
Add to Reading List

Document Date: 2013-03-28 20:19:28


Open Document

File Size: 200,11 KB

Share Result on Facebook

Company

Path Selector T F Solutions / Yahoo / BitScope / /

Facility

Computer Science Carnegie Mellon University / A store / /

IndustryTerm

search capacity / defense systems / analyzed malicious software / service attack tools / malicious software / /

OperatingSystem

Microsoft Windows / /

Organization

Army Research Office / U.S. Army Research Office / National Science Foundation / U.S. Government / CMU-CS-07-133 School of Computer Science Carnegie Mellon University Pittsburgh / International Technology Alliance / Carnegie Mellon / Ministry of Information / Institute for Information Technology Advancement / /

Person

Cody Hartwig / Min Gyung Kang / Dawn Song / David Brumley / Liang James Newsome / Grant Nos / /

Position

Extractor The Extractor / Extractor / evaluator / BitScope Extractor / representative / /

ProvinceOrState

Pennsylvania / /

Technology

encryption / virtual machine / Code encryption / Response technology / Information Technology / API / /

SocialTag