Analyzing Memory Accesses in Obfuscated x86 Executables

Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia. Analyzing Memory Accesses in Obfuscated x86 Executables. In Klaus Julisch, Christopher Krügel, editors, Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings. Volume 3548 of Lecture Notes in Computer Science, pages 1-18, Springer, 2005. [doi]

@inproceedings{VenableCKL05,
  title = {Analyzing Memory Accesses in Obfuscated x86 Executables},
  author = {Michael Venable and Mohamed R. Chouchane and Md. Enamul Karim and Arun Lakhotia},
  year = {2005},
  doi = {10.1007/11506881_1},
  url = {http://dx.doi.org/10.1007/11506881_1},
  researchr = {https://researchr.org/publication/VenableCKL05},
  cites = {0},
  citedby = {0},
  pages = {1-18},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings},
  editor = {Klaus Julisch and Christopher Krügel},
  volume = {3548},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-26613-5},
}