Download (221Kb)
UNPACKING CODE PATTERN FROM PACKED BINARY EXECUTABLE USING EXECUTION UNIT PATTERN BASED SEQUENCE ALIGNMENT ANALYSIS Page 94 of 103 Bibliography “AV-TEST, The Independent IT-Security Institute.” , 2018, URL https://www. av-test.org/en/statistics/malware/. Al-Anezi, M. M. K., “Generic packing detection using several complexity analysis for accurate malware detection,” International journal of advanced computer science and applications, volume 5(1), 2015. Alimehr, L., “The performance of sequence alignment algorithms,” , 2013. Armadillo, “Armadillo, Overlays packer and obfuscator,” , 2017, URL http: //the-armadillo-software-protection-system.software.informer.com, (Date last accessed 1 March 2017). Banin, S., Shalaginov, A., and Franke, K., “Memory access patterns for malware detec- tion,” , 2016. Bazrafshan, Z., Hashemi, H., Fard, S. M. H., and Hamzeh, A., “A survey on heuris- tic malware detection techniques,” in “Information and Knowledge Technology (IKT), 2013 5th Conference on,” pp. 113–120, IEEE, 2013. Beek, C., Dinkar, D., Gund, Y., and Others, “McAfee Labs threats report,” McAfee Inc., Santa Clara, CA. Available: https://www.mcafee.com/us/resources/reports/rp- quarterly-threats-dec-2017.pdf, 2017. Bellard, F., “Qemu: Open source processor emulator, 2008,” URL http://savannah. nongnu. org/projects/qemu, 2009. Benninger, C. A., Maitland: analysis of packed and encrypted malware via paravirtu- alization extensions, Ph.D. thesis, University of Victoria, 2012. Berdajs, J. and Bosnic,´ Z., “Extending applications using an advanced approach to DLL injection and API hooking,” Software: Practice and Experience, volume 40(7) pp. 567– 584, 2010. Andy Asmoro UNPACKING CODE PATTERN FROM PACKED BINARY EXECUTABLE USING EXECUTION UNIT PATTERN BASED SEQUENCE ALIGNMENT ANALYSIS Page 95 of 103 Bergroth, L., Hakonen, H., and Raita, T., “A survey of longest common subsequence algorithms,” in “String Processing and Information Retrieval, 2000.
[Show full text]