Back to Results
First PageMeta Content
Malware / Search algorithms / Cryptography / Polymorphic code / Obfuscation / Rootkit / Obfuscated code / Hash table / Computer virus / Computer programming / Computing / Software engineering


Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2
Add to Reading List

Document Date: 2008-01-28 08:33:00


Open Document

File Size: 1,64 MB

Share Result on Facebook

City

Milano / /

Company

AES / /

Country

United States / Italy / /

/

Facility

College of Computing / Georgia Institute of Technology / /

IndustryTerm

informed key search attacks / compiler infrastructure / compiler-level tool / call-site / binary modification tool / program analysis algorithms / obfuscation tool / particular applications / anti-virus tools / applicable tool / search space / encryption algorithm / user level tools / search time / /

OperatingSystem

Linux / Microsoft Windows / /

Organization

Andrea Lanzi2 Wenke Lee1 School of Computer Science / Georgia Institute of Technology / Brute Force / U.S. Securities and Exchange Commission / College of Computing / /

Position

candidate for obfuscation / malware writer / malware analyst / malware author / representative / General / /

Product

DynInst / Key(X) / /

ProgrammingLanguage

C / C++ / /

Technology

3.2 Encryption / encryption / program analysis algorithms / symmetric encryption / peer-to-peer / encryption algorithm / Linux / API / block cipher / code blocks needing encryption / P2P / code block needing encryption / Performing encryption / UDP / /

SocialTag