Code obfuscation techniques for metamorphic viruses
- 21 February 2008
- journal article
- Published by Springer Science and Business Media LLC in Journal of Computer Virology and Hacking Techniques
- Vol. 4 (3), 211-220
- https://doi.org/10.1007/s11416-008-0084-2
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Code Normalization for Self-Mutating MalwareIEEE Security & Privacy, 2007
- A semantics-based approach to malware detectionPublished by Association for Computing Machinery (ACM) ,2007
- Static Analyzer of Vicious Executables (SAVE)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Testing malware detectorsPublished by Association for Computing Machinery (ACM) ,2004
- Reliable identification of bounded-length viruses is NP-completeIEEE Transactions on Information Theory, 2003
- An Approach to the Obfuscation of Control-Flow of Sequential Computer ProgramsLecture Notes in Computer Science, 2001
- On the (Im)possibility of Obfuscating ProgramsLecture Notes in Computer Science, 2001
- Compiler techniques for code compactionACM Transactions on Programming Languages and Systems, 2000
- Manufacturing cheap, resilient, and stealthy opaque constructsPublished by Association for Computing Machinery (ACM) ,1998
- Classes of recursively enumerable sets and their decision problemsTransactions of the American Mathematical Society, 1953