|
Kumar, Kapoor, and Lakhotia. DOC - Answering the Hidden 'Call' of A Virus. Virus Bulletin, Apr, 2005, pp. 7-10. Venable, Chouchane, Karim, and Lakhotia. Analyzing Memory Accesses in Obfuscated x86 Executables. Intrusion and Malware Detection and Vulnerability Assessment: Second International Conference, DIMVA 2005, (Vienna, Austria, Jul 7-8), Klaus Julisch and Christopher Kruegel, ed., Lecture Notes in Computer Studies, v. 3548, Springer Verlag, 2005, pp. 1-8. Lakhotia, Kumar, and Venable. A Method for Detecting Obfuscated Calls in Malicious Binaries. Transactions on Software Engineering, v. 31, n. 11, Nov, 2005, pp. 955-968. Lakhotia and Kumar. Abstracting Stack to Detect Obfuscated Calls in Binaries. Proceedings of SCAM'04: The Fourth IEEE International Workshop on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2004, pp. 17-26. |