Refinement-Based CFG Reconstruction from Unstructured Programs, Proc. Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp.54-69, 2011. ,
DOI : 10.1007/978-3-642-14295-6_27
Binary code extraction and interface identification for security applications, Proc. ISOC Network and Distributed Systems Security Symp. (NDSS), 2010. ,
Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.523-529, 2007. ,
DOI : 10.1145/1315245.1315286
Analyse dynamique de logiciels malveillants, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-00922384
The case for in-the-lab botnet experimentation, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.141-150, 2010. ,
DOI : 10.1145/1920261.1920284
URL : https://hal.archives-ouvertes.fr/inria-00536706
WaveAtlas: surfing through the landscape of current malware packers, Proc. Virus Bulletin Conf, 2015. ,
Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009. ,
Automatic Static Unpacking of Malware Binaries, 2009 16th Working Conference on Reverse Engineering, pp.167-176, 2009. ,
DOI : 10.1109/WCRE.2009.24
Reverse Engineering Self-Modifying Code: Unpacker Extraction, 2010 17th Working Conference on Reverse Engineering, pp.131-140, 2010. ,
DOI : 10.1109/WCRE.2010.22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.7193
The ida pro disassembler and debugger ,
Server-side dynamic code analysis, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp.55-62, 2009. ,
DOI : 10.1109/MALWARE.2009.5403017
URL : https://hal.archives-ouvertes.fr/inria-00425554
A Study of the Packer Problem and Its Solutions, Proc. Int. Symp. Recent Advances in Intrusion Detection (RAID), pp.98-115, 2008. ,
DOI : 10.1007/978-3-540-87403-4_6
The Mälardalen WCET benchmarks ? past, present and future, Proc. Int. Work. on Worst-Case Execution Time Analysis (WCET), pp.137-147, 2010. ,
Pushdown model generation of malware, Japan Advanced Institute of Science and Technology, 2014. ,
A new instruction overlapping technique for anti-disassembly and obfuscation of x86 binaries, 2013 Workshop on Anti-malware Testing Research, 2013. ,
DOI : 10.1109/WATeR.2013.6707878
Renovo, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.46-53, 2007. ,
DOI : 10.1145/1314389.1314399
Static analysis of x86 executables, 2010. ,
Alternating Control Flow Reconstruction, Proc. Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp.267-282, 2012. ,
DOI : 10.1007/978-0-387-44599-1_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.498.7032
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries, Proc. Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp.214-228, 2009. ,
DOI : 10.1007/978-3-540-93900-9_19
Static detection of disassembly errors Static disassembly of obfuscated binaries, Proc. IEEE Working Conf. on Reverse Engineering (WCRE) Proc. USENIX Security Symposium, pp.259-268, 2004. ,
Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.290-299, 2003. ,
DOI : 10.1145/948109.948149
PIN, Proceedings of the 2004 workshop on Computer architecture education held in conjunction with the 31st International Symposium on Computer Architecture, WCAE '04, 2005. ,
DOI : 10.1145/1275571.1275600
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007. ,
DOI : 10.1109/ACSAC.2007.15
Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007. ,
DOI : 10.1109/ACSAC.2007.21
BIRD: Binary Interpretation using Runtime Disassembly, International Symposium on Code Generation and Optimization (CGO'06), 2006. ,
DOI : 10.1109/CGO.2006.6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9928
Modelling metamorphism by abstract interpretation, Proc. Int. Static Analysis Symposium (SAS), pp.218-235, 2010. ,
Improved Memory-Access Analysis for x86 Executables, Compiler Construction, pp.16-35, 2008. ,
DOI : 10.1007/978-3-540-78791-4_2
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.289-300, 2006. ,
DOI : 10.1109/ACSAC.2006.38
Disassembly of executable code revisited, Ninth Working Conference on Reverse Engineering, 2002. Proceedings., p.45, 2002. ,
DOI : 10.1109/WCRE.2002.1173063
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.46
Static Disassembly and Code Analysis, Malware Detection of Advances in Information Security, pp.19-41, 2007. ,
DOI : 10.1007/978-0-387-44599-1_2
A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.47