실행 파일 형태로 복원하기 위한 Themida 자동 역난독화 도구 구현
Vol. 27, No. 4, pp. 785-802,
8월.
2017
10.13089/JKIISC.2017.27.4.785, Full Text:
Keywords: De-obfuscation, Program Analysis, software protection, Automatic Analysis Tool
Abstract Statistics
Cite this article
10.13089/JKIISC.2017.27.4.785, Full Text:
Keywords: De-obfuscation, Program Analysis, software protection, Automatic Analysis Tool
Abstract Statistics
Cite this article
[IEEE Style]
Y. Kang, M. C. Park, D. H. Lee, "Implementation of the Automated De-Obfuscation Tool to Restore Working Executable," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 4, pp. 785-802, 2017. DOI: 10.13089/JKIISC.2017.27.4.785.
[ACM Style]
You-jin Kang, Moon Chan Park, and Dong Hoon Lee. 2017. Implementation of the Automated De-Obfuscation Tool to Restore Working Executable. Journal of The Korea Institute of Information Security and Cryptology, 27, 4, (2017), 785-802. DOI: 10.13089/JKIISC.2017.27.4.785.