From: | isiisorisiaint@gmail.com |
Newsgroups: | comp.compilers |
Date: | Wed, 14 Aug 2013 08:20:48 -0700 (PDT) |
Organization: | Compilers Central |
References: | 13-08-002 <B5FEE00B53CF054AA8439027E8FE17751EFB7508@IMCMBX04.MITRE.ORG> 13-08-006 13-08-008 13-08-010 13-08-011 |
Injection-Date: | Wed, 14 Aug 2013 15:20:48 +0000 |
Keywords: | code |
Posted-Date: | 15 Aug 2013 17:33:05 EDT |
Found something that bears some resemblance with my half-trusted execution environment, so i'll list it here maybe others will find it useful: http://www.google.com/search?q=%22Exploiting+Code+Mobility+for+Dynamic+Binary+Obfuscation%22+pdf
A couple of links on generic code obfuscation techniques:
* http://www.google.com/search?q=%22A+taxonomy+of+obfuscating+transformations%22+pdf
* https://www.google.com/search?q=%22Code+Obfuscation+against+Static+and+Dynamic+Reverse+Engineering%22+pdf
A link on proactive obfuscation as a moving target defense:
* http://www.google.com/search?q="Proactive+Obfuscation"+microsoft+pdf
Finally, a link on protocol de-obfuscation:
* http://www.google.com/search?q="Polyglot%3A+Automatic+Extraction+of+Protocol"+carnegie+pdf
Return to the
comp.compilers page.
Search the
comp.compilers archives again.