Back to Results
First PageMeta Content
Assembly languages / X86 architecture / Subroutines / X86 assembly language / Machine code / Calling convention / Malware / Pointer / INT / Computing / Computer architecture / Software engineering


Automatic Extraction of Secrets from Malware Ziming Zhao, Gail-Joon Ahn and Hongxin Hu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA {zmzhao, gahn, hxhu}@
Add to Reading List

Document Date: 2011-09-01 00:19:23


Open Document

File Size: 342,21 KB

Share Result on Facebook

City

EBP / /

Company

John Wiley and Sons / Syngress Media Inc / Intel / Microsoft / /

/

Facility

Hongxin Hu Laboratory of Security Engineering / C library / MSDN Library / Arizona State University / /

IndustryTerm

commodity software / security applications / botnet protocols / binary relocation algorithm / communications security / protection algorithms / software-based fault isolation / manual and automatic solutions / sandbox systems / naive algorithm / cryptographic algorithms / algorithm extraction solutions / encryption algorithm / pre-processing / memory management / electronic commerce / pre-processing phase / /

OperatingSystem

Windows PE / Windows XP Professional / DOS / Microsoft Windows / GNU / POSIX / /

Organization

National Science Foundation / Department of Energy / USENIX Association / Arizona State University / /

Person

T. Akgul / V / Gail-Joon Ahn / /

/

Position

Inspector / malware author / engineer / /

Product

Franklin / Figure 3 / Windows API GetTickCount / /

ProgrammingLanguage

C / C++ / /

ProvinceOrState

Arkansas / /

PublishedMedium

the Recent Advances / /

Technology

virtual machine / RAM / dword_4C09A0 dword_42192D sub_40E712 WinMain sub_40E697 Encryption / Kraken encryption algorithm / API / binary relocation algorithm / identifying substitution encryption / symmetric and asymmetric key encryption / decoding algorithm / operating system / Operating Systems / encryption / network protocol / DNS / extracted algorithm / naive algorithm / protection algorithms / /

URL

http /

SocialTag