Export Citations
1 Results for: Keyword: Virtualization-Obfuscation
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Searched The ACM Guide to Computing Literature (3,801,365 records)|Limit your search to The ACM Full-Text Collection (771,061 records)
- ArticleMay 2015
A Generic Approach to Automatic Deobfuscation of Executable Code
SP '15: Proceedings of the 2015 IEEE Symposium on Security and PrivacyPages 674–691https://doi.org/10.1109/SP.2015.47Malicious software are usually obfuscated to avoid detection and resist analysis. When new malware is encountered, such obfuscations have to be penetrated or removed ("deobfuscated") in order to understand the internal logic of the code and devise ...