Cited By
View all- Noureddine LHeuser APuodzius CZendra OJoshi ACarminati BVerma R(2021)SE-PACProceedings of the Eleventh ACM Conference on Data and Application Security and Privacy10.1145/3422337.3447848(281-292)Online publication date: 26-Apr-2021
Malware applies lots of obfuscation techniques, which are often automatically generated by the use of packers. This paper presents a packer identification of packed code based on metadata signature, which is a frequency vector of occurrences of ...
Malicious softwares such as trojans, viruses, or worms can cause serious damage for information systems by exploiting operating system and application software vulnerabilities. Worms constitute a significant proportion of overall malicious software and ...
Run-time binary packers are used in malware manufacturing to obfuscate the contents of the executable files. Such packing has proved an obstacle for antivirus software that relies on signatures, as the binary contents of packed malware often bears no ...
IEEE Press
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in