Re: invitation to discussion: code and protocol obfuscation techniques

isiisorisiaint@gmail.com
Wed, 14 Aug 2013 08:20:48 -0700 (PDT)

          From comp.compilers

Related articles
invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (Gyll .) (2013-08-01)
Re: invitation to discussion: code and protocol obfuscation techniques gah@ugcs.caltech.edu (glen herrmannsfeldt) (2013-08-04)
Re: invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (Gyll .) (2013-08-05)
Re: invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (Gyll .) (2013-08-05)
Re: invitation to discussion: code and protocol obfuscation techniques gah@ugcs.caltech.edu (glen herrmannsfeldt) (2013-08-06)
Re: invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (2013-08-08)
Re: invitation to discussion: code and protocol obfuscation techniques gah@ugcs.caltech.edu (glen herrmannsfeldt) (2013-08-08)
Re: invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (2013-08-14)
Re: invitation to discussion: code and protocol obfuscation techniques genew@telus.net (Gene Wirchenko) (2013-08-20)
| List of all articles for this month |

From: isiisorisiaint@gmail.com
Newsgroups: comp.compilers
Date: Wed, 14 Aug 2013 08:20:48 -0700 (PDT)
Organization: Compilers Central
References: 13-08-002 <B5FEE00B53CF054AA8439027E8FE17751EFB7508@IMCMBX04.MITRE.ORG> 13-08-006 13-08-008 13-08-010 13-08-011
Injection-Date: Wed, 14 Aug 2013 15:20:48 +0000
Keywords: code
Posted-Date: 15 Aug 2013 17:33:05 EDT

Found something that bears some resemblance with my half-trusted execution environment, so i'll list it here maybe others will find it useful: http://www.google.com/search?q=%22Exploiting+Code+Mobility+for+Dynamic+Binary+Obfuscation%22+pdf


A couple of links on generic code obfuscation techniques:
* http://www.google.com/search?q=%22A+taxonomy+of+obfuscating+transformations%22+pdf
* https://www.google.com/search?q=%22Code+Obfuscation+against+Static+and+Dynamic+Reverse+Engineering%22+pdf


A link on proactive obfuscation as a moving target defense:
* http://www.google.com/search?q="Proactive+Obfuscation"+microsoft+pdf


Finally, a link on protocol de-obfuscation:
* http://www.google.com/search?q="Polyglot%3A+Automatic+Extraction+of+Protocol"+carnegie+pdf



Post a followup to this message

Return to the comp.compilers page.
Search the comp.compilers archives again.