First Page | Document Content | |
---|---|---|
![]() Date: 2014-03-19 00:11:17Faronics New Executable EXE Executable Library COM file EXE packers Executable compression Computing System software Computer architecture | Add to Reading List |
![]() | Attacking Obfuscated Code with IDA Pro Chris EagleDocID: 18pND - View Document |
![]() | A Security Microcosm Attacking and Defending Shiva Shiva written by Neel Mehta and Shaun Clowes Presented by Shaun ClowesDocID: 15pdm - View Document |
![]() | Strike/Counter-Strike: Reverse Engineering Shiva Chris Eagle Naval Postgraduate School OutlineDocID: 135s9 - View Document |
![]() | Renovo: A Hidden Code Extractor for Packed Executables Min Gyung Kang, Pongsin Poosankam, and Heng Yin ∗ Carnegie Mellon UniversityDocID: 11VI3 - View Document |
![]() | SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers Xabier Ugarte-Pedrero∗ , Davide Balzarotti† , Igor Santos∗ , Pablo G. Bringas∗ ∗ DeustoTech, University of DeustoDocID: 11Jms - View Document |