가상화 난독화 기법이 적용된 실행 파일 분석 및 자동화 분석 도구 구현
Vol. 23, No. 4, pp. 709-720,
8월.
2013
10.13089/JKIISC.2013.23.4.709, Full Text:
Keywords: Virtualization Obfuscation, Program Analysis, Automatic Analysis Tool
Abstract Statistics
Cite this article
10.13089/JKIISC.2013.23.4.709, Full Text:
Keywords: Virtualization Obfuscation, Program Analysis, Automatic Analysis Tool
Abstract Statistics
Cite this article
[IEEE Style]
J. H. Suk, S. Kim, D. H. Lee, "Analysis of Virtualization Obfuscated Executable Files and Implementation of Automatic Analysis Tool," Journal of The Korea Institute of Information Security and Cryptology, vol. 23, no. 4, pp. 709-720, 2013. DOI: 10.13089/JKIISC.2013.23.4.709.
[ACM Style]
Jae Hyuk Suk, Sunghoon Kim, and Dong Hoon Lee. 2013. Analysis of Virtualization Obfuscated Executable Files and Implementation of Automatic Analysis Tool. Journal of The Korea Institute of Information Security and Cryptology, 23, 4, (2013), 709-720. DOI: 10.13089/JKIISC.2013.23.4.709.