Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli...
详细信息
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th...
详细信息
Kernel-level malwares are a serious threat to the integrity and security of the operating system. Current kernel integrity measurement methods have one-sidedness in selecting the measurement objects, and the character...
详细信息
Control flow graph is an important concept in the field of program analysis, which represents the source program in the form of graph. On the control flow graph, we can easily analyze the predecessor and successor rel...
详细信息
A binary program is an executable file obtained by compiling the source code. In order to reduce the size of software or prevent reverse engineering, software publishers usually only release executable files that have...
详细信息
How to locate the target function faster and more accurately is a key problem of Automatic Reverse-engineering of Software Programs. In order to solve this problem, a target function location method based on code cove...
详细信息
Dynamic Binary Translation (DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of Alpha. However, there exist some factors that impede its performance: high ...
详细信息
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r...
详细信息
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ...
详细信息
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op...
详细信息
暂无评论