References
- W. Yan, Z. Zhang, N. Ansari, "Revealing Packed Malware", IEEE Security & Privacy, Vol.6, Issue 5, pp. 65-69, 2008. http://dx.doi.org/10.1109/MSP.2008.126
- Dhruwajita Devi, Sukumar Nandi, "Detection of packed malware", SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, pp. 22-26, NY, USA, August, 2012. http://dx.doi.org/10.1145/2490428.2490431
- Gabriel Negreira Barbosa, Rodrigo Rubira Branco, "Prevalent Characteristics in Modern Malware", black hat USA 2014, Las Vegas, USA, August, 2014. https://www.blackhat.com/docs/us-14/materials/us-14-Branco-Prevalent-Characteristics-In-Modern-Malware.pdf
- Luk, C., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Vijay Janapa Reddi, and Hazelwood, "K. Pin: building customized program analysis tools with dynamic instrumentation", In Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, Chicago, IL, USA, June, 2005. http://dx.doi.org/10.1145/1065010.1065034
- Steven Wallace, Kim Hazelwood, "SuperPin: Parallelizing Dynamic Instrumentation for Real-Time Performance", International Symposium on Code Generation and Optimization, San Jose, CA, March 2007. http://dx.doi.org/10.1109/CGO.2007.37
- Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, "Analysis of Computer Intrusions Using Sequences of Function Calls", IEEE Transactions on Dependable and Secure Computing (TDSC), Vol 4, Issue 2, pp. 137-150, April, 2007. http://dx.doi.org/10.1109/TDSC.2007.1003
- Alex Skaletsky, Tevi Devor, Nadav Chachmon, Robert Cohn, Kim Hazelwood, Vladimir Vladimirov, Moshe Bach. "Dynamic Program Analysis of Microsoft Windows Applications", International Symposium on Performance Analysis of Software and Systems (ISPASS). White Plains, NY. April 2010. http://dx.doi.org/10.1109/ISPASS.2010.5452079
- Pin 2.14 User Guide - https://software.intel.com/sites/landingpage/pintool/docs/71313/Pin/html/
- RR Branco, GN Barbosa, PD Neto, "Scientific but Not Academical Overview of Malware Anti-Debugging, Anti-Disassembly and Anti-VM Technologies", black hat USA 2012, Las Vegas, USA, July, 2012. https://media.blackhat.com/bh-us-12/Briefings/Branco/BH_US_12_Branco_Scientific_Academic_Slides.pdf
- A. J. Smith, R. F. Mills, A. R. Bryant, G. L. Peterson, M. R. Grimaila, "REDIR: Automated Static Detection of Obfuscated Anti-Debugging Techniques", Collaboration Technologies and Systems (CTS), 2014 International Conference, Minneapolis, MN, USA, May, 2014. http://dx.doi.org/10.1109/CTS.2014.6867561
- K. Yoshizaki, T. Yamauchi, "Malware Detection Method Focusing on Anti-debugging Functions", Computing and Networking (CANDAR), 2014 Second International Symposium, Shizuoka, Japan, Dec, 2014. http://dx.doi.org/10.1109/CANDAR.2014.36
- Tyler Shields. Anti-Debugging - A Developers View. Whitepaper, Veracode Inc, 2009.
- Peter Ferrie. The "Ultimate" Anti-Debugging Reference, May, 2011 - http://www.anti-reversing.com/the-ultimate-anti-debugging-reference/
- An Anti-Reverse Engineering Guide - http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide
- Introduction Into Windows Anti-Debugging - http://www.codeproject.com/Articles/29469/Introduction-Into-Windows-Anti-Debugging