Logo des Repositoriums
 

Analyzing Malware Putty using Function Alignment in the Binary

dc.contributor.authorWichmann, Arne
dc.contributor.authorSchulze, Sandro
dc.contributor.authorSchupp, Sibylle
dc.date.accessioned2023-03-08T14:17:34Z
dc.date.available2023-03-08T14:17:34Z
dc.date.issued2016
dc.description.abstractThis paper shows a representation of executables and an alignment of functions in an executable to be used when reverse engineering embedded systems. These techniques are not limited to this application and can also be used when studying code variations, code clone-and-own scenarios, and when locating hotspots for software quality inspections.en
dc.identifier.pissn0720-8928
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/40727
dc.language.isoen
dc.publisherGeselllschaft für Informatik e.V.
dc.relation.ispartofSoftwaretechnik-Trends Band 36, Heft 3
dc.titleAnalyzing Malware Putty using Function Alignment in the Binaryen
dc.typeText/Journal Article
gi.citation.publisherPlaceBonn
gi.conference.sessiontitleBerichte aus den Fachgruppen und Arbeitskreisen

Dateien

Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
WSRE2016_08_paper_15.pdf
Größe:
343.58 KB
Format:
Adobe Portable Document Format