Dynamic analysis of virtualization- and dispatching-obfuscated applications

Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics. Another obfuscation method known as “dispatching” can be used to transform application control flow similarly to virtual machine insertion...

Full description

Bibliographic Details
Main Authors: M. G. Bakulin, S. S. Gaissaryan, Sh. F. Kurmangaleev, I. N. Ledovskikh, V. A. Padaryan, S. M. Shchevyeva
Format: Article
Language:English
Published: Ivannikov Institute for System Programming of the Russian Academy of Sciences 2018-10-01
Series:Труды Института системного программирования РАН
Subjects:
Online Access:https://ispranproceedings.elpub.ru/jour/article/view/972