Analyzing Malware Putty using Function Alignment in the Binary
dc.contributor.author | Wichmann, Arne | |
dc.contributor.author | Schulze, Sandro | |
dc.contributor.author | Schupp, Sibylle | |
dc.date.accessioned | 2023-03-08T14:17:34Z | |
dc.date.available | 2023-03-08T14:17:34Z | |
dc.date.issued | 2016 | |
dc.description.abstract | This paper shows a representation of executables and an alignment of functions in an executable to be used when reverse engineering embedded systems. These techniques are not limited to this application and can also be used when studying code variations, code clone-and-own scenarios, and when locating hotspots for software quality inspections. | en |
dc.identifier.pissn | 0720-8928 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/40727 | |
dc.language.iso | en | |
dc.publisher | Geselllschaft für Informatik e.V. | |
dc.relation.ispartof | Softwaretechnik-Trends Band 36, Heft 3 | |
dc.title | Analyzing Malware Putty using Function Alignment in the Binary | en |
dc.type | Text/Journal Article | |
gi.citation.publisherPlace | Bonn | |
gi.conference.sessiontitle | Berichte aus den Fachgruppen und Arbeitskreisen |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- WSRE2016_08_paper_15.pdf
- Größe:
- 343.58 KB
- Format:
- Adobe Portable Document Format