awesome-executable-packing
A curated list of awesome resources related to executable packing
https://github.com/packing-box/awesome-executable-packing
Last synced: 2 days ago
JSON representation
-
:books: Literature
-
Documentation
- a.out (FreeBSD manual pages)
- A.out binary format
- About anti-debug tricks
- Android packers: Separating from the pack
- Anti debugging protection techniques with examples
- Anti-unpacker tricks - Part 14 (and previous parts)
- API deobfuscator: Resolving obfuscated API functions in modern packers
- The art of unpacking
- COM binary format
- Defacto2
- Dynamic binary analysis and obfuscated codes
- elf (FreeBSD manual pages)
- Executable file formats
- FatELF: Universal binaries for Linux (HALTED)
- Implementing your own generic unpacker
- Mach-O internals
- Making our own executable packer
- Microsoft portable executable and common object file format specification
- MITRE ATT&CK | T1027.002 | obfuscated files or information: Software packing
- MZ disk operating system (DOS)
- One packer to rule them all: Empirical identification, comparison and circumvention of current antivirus detection techniques
- One packer to rule them all: Empirical identification, comparison and circumvention of current antivirus detection techniques
- Packers
- Parsing mach-O files
- PinDemonium: A DBI-based generic unpacker for Windows executables
- Portable executable (PE)
- Reverse engineering malware: Binary obfuscation and protection
- TitanMist: Your first step to reversing nirvana
- Writing a packer
- Writing a simple PE packer in detail
- TitanMist: Your first step to reversing nirvana
- ProtectMyTooling - Don't detect tools, detect techniques
- Unpacking, reversing, patching
- Mach-O - A look at apple executable files
- On the worst-case complexity of timsort
- ProtectMyTooling - Don't detect tools, detect techniques
- Machine learning
- The matthews correlation coefficient (MCC) should replace the ROC AUC as the standard metric for assessing binary classification
- NotPacked++: Evading static packing detection
- The art of memory forensics: Detecting malware and threats in Windows, Linux, and mac memory
- Cluster analysis
- Cloak and dagger: Unpacking hidden malware attacks
- Unpacking, reversing, patching
- Implementing your own generic unpacker
- MITRE ATT&CK | T1406.002 | obfuscated files or information: Software packing - Mobile
- NotPacked++: Evading static packing detection
- OllyDbg OEP finder scripts
- Packing-box: Improving detection of executable packing
- Unpacking the potential of "Packing box"
- Unpacking, reversing, patching
- Writing a PE packer
- NotPacked++: Evading static packing detection
- Packing-box: Improving detection of executable packing
- a.out (FreeBSD manual pages)
- About anti-debug tricks
- Anti-unpacker tricks - Part 14 (and previous parts)
- The art of memory forensics: Detecting malware and threats in Windows, Linux, and mac memory
- Cluster analysis
- Dynamic binary analysis and obfuscated codes
- elf (FreeBSD manual pages)
- Executable file formats
- FatELF: Universal binaries for Linux (HALTED)
- How to use t-SNE effectively
- Implementing your own generic unpacker
- Mach-O - A look at apple executable files
- Machine learning
- The matthews correlation coefficient (MCC) should replace the ROC AUC as the standard metric for assessing binary classification
- MITRE ATT&CK | T1027.002 | obfuscated files or information: Software packing - Enterprise
- MITRE ATT&CK | T1406.002 | obfuscated files or information: Software packing - Mobile
- Parsing mach-O files
- Practical malware analysis: The hands-on guide to dissecting malicious software
- Writing a packer
- Writing a simple PE packer in detail
- Awesome LLVM security
- Cloak and dagger: Unpacking hidden malware attacks
- Clustering algorithms
- Common object file format (COFF)
- Comparison of executable file formats
- A complexity measure
- Cyclomatic complexity density and software maintenance productivity
- Defacto2
- Do we need hundreds of classifiers to solve real world classification problems?
- Entropy and the distinctive signs of packer PE files
- Executable and linkable format (ELF)
- Executable and linking format (ELF) specification
- Explained: Packer, crypter, and protector
- Feature selection: A data perspective
- Hyperion: Implementation of a PE-Crypter
- Mach-O file format reference
- Packer detection tool evaluation
- Packing-box: Breaking detectors & visualizing packing
- Packing-box: Playing with executable packing
- Pattern recognition and machine learning (Information science and statistics)
- PE format - Win32 apps
- Runtime packers: The hidden problem?
- A survey of dimensionality reduction techniques
- Tuts 4 you - UnPackMe (.NET)
- Tuts 4 you | unpackme
- The "Ultimate" anti-debugging reference
- Unpacking binary 101
- Virtual machine obfuscation
- We can still crack you! General unpacking method for Android Packer (NO ROOT)
- When malware is packing heat
- Win32 portable executable packing uncovered
- x86 disassembly/Windows executable files
-
Scientific Research
- All-in-one framework for detection, unpacking, and verification for malware analysis
- Analysis of machine learning approaches to packing detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Anti-unpacker tricks
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- ByteWise: A case study in neural network obfuscation identification
- Classification of packed executables for accurate computer virus detection
- A comparative analysis of classifiers in the recognition of packed executables
- A comparative analysis of software protection schemes
- Comparing malware samples for unpacking: A feasibility study
- Computational-intelligence techniques for malware generation
- A consistently-executing graph-based approach for malware packer identification
- Dealing with virtualization packers
- Denial-of-service attacks on host-based generic unpackers
- Detecting packed executables based on raw binary data
- Detecting traditional packers, decisively
- Detection of metamorphic malware packers using multilayered LSTM networks
- DexHunter: Toward extracting hidden code from packed Android applications
- Dynamic binary instrumentation for deobfuscation and unpacking
- Effective, efficient, and robust packing detection and classification
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fast flowgraph based classification system for packed and polymorphic malware on the endhost
- A fine-grained classification approach for the packed malicious code
- A generic approach to automatic deobfuscation of executable code
- Generic unpacker of executable files
- Generic unpacking method based on detecting original entry point
- Hashing-based encryption and anti-debugger support for packing multiple files into single executable
- A heuristics-based static analysis approach for detecting packed PE binaries
- Maitland: Analysis of packed and encrypted malware via paravirtualization extensions
- Mal-flux: Rendering hidden code of packed binary executable
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Malware makeover: Breaking ML-based static analysis by modifying executable bytes
- Modern linux malware exposed
- On deceiving malware classification with section injection
- On the (Im)possibility of obfuscating programs
- On the adoption of anomaly detection for packed executable filtering
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packed malware detection using entropy related analysis: A survey
- Packed malware variants detection using deep belief networks
- Packed PE file detection for malware forensics
- Packer analysis report debugging and unpacking the NsPack 3.4 and 3.7 packer
- Packer detection for multi-layer executables using entropy analysis
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- Preprocessing of binary executable files towards retargetable decompilation
- Qualitative and quantitative evaluation of software packers
- RAMBO: Run-Time packer analysis with multiple branch observation
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Standards and policies on packer use
- Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus
- A static, packer-agnostic filter to detect similar malware samples
- Structural feature based anomaly detection for packed executable identification
- The study of evasion of packed PE from static detection
- A study of the packer problem and its solutions
- Survey on malware evasion techniques: State of the art and challenges
- Syntia: Synthesizing the semantics of obfuscated code
- Things you may not know about Android (Un) packers: A systematic study based on whole-system emulation.
- Toward generic unpacking techniques for malware analysis with quantification of code revelation
- WaveAtlas: Surfing through the landscape of current malware packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Packer identification using byte plot and Markov plot
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Adversarial EXEmples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- DexHunter: Toward extracting hidden code from packed Android applications
- Entropy analysis to classify unknown packing algorithms for malware detection
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Efficient and automatic instrumentation for packed binaries
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- MaliCage: A packed malware family classification framework based on DNN and GAN
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer classification based on association rule mining
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- An application of machine learning to analysis of packed mac malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Chosen-instruction attack against commercial code virtualization obfuscators
- A fine-grained classification approach for the packed malicious code
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Automated static analysis of virtual-machine packers
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Pattern recognition techniques for the classification of malware packers
- Packer identification using hidden Markov model
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Research of software information hiding algorithm based on packing technology
- RAMBO: Run-Time packer analysis with multiple branch observation
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- PE-Miner: Mining structural information to detect malicious executables in realtime
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Pattern recognition techniques for the classification of malware packers
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- BitBlaze: A new approach to computer security via binary analysis
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Certified robustness of static deep learning-based malware detectors against patch and append attacks
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Mal-xtract: Hidden code extraction using memory analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Symbolic execution of obfuscated code
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- A fine-grained classification approach for the packed malicious code
- Entropy analysis to classify unknown packing algorithms for malware detection
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-xtract: Hidden code extraction using memory analysis
- A machine-learning-based framework for supporting malware detection and analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- PEAL - Packed executable analysis
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- Semi-supervised learning for unknown malware detection
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Packer identification using byte plot and Markov plot
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Experimental toolkit for manipulating executable packing
- BitBlaze: A new approach to computer security via binary analysis
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Detecting traditional packers, decisively
- Denial-of-service attacks on host-based generic unpackers
- DexHunter: Toward extracting hidden code from packed Android applications
- Entropy analysis to classify unknown packing algorithms for malware detection
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- A comparative assessment of malware classification using binary texture analysis and dynamic analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- An efficient algorithm to extract control flow-based features for ioT malware detection
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- ESCAPE: Entropy score analysis of packed executable
- Ether: Malware analysis via hardware virtualization extensions
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Feature selection for packer classification based on association rule mining
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- DexHunter: Toward extracting hidden code from packed Android applications
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Automated static analysis of virtual-machine packers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- BitBlaze: A new approach to computer security via binary analysis
- Control flow-based opcode behavior analysis for malware detection
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Detecting unknown malicious code by applying classification techniques on opcode patterns
- Generic unpacking method based on detecting original entry point
- An efficient algorithm to extract control flow-based features for ioT malware detection
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Entropy analysis to classify unknown packing algorithms for malware detection
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Efficient and automatic instrumentation for packed binaries
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- On the (Im)possibility of obfuscating programs
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Adversarial attacks against windows PE malware detection: A survey of the state-of-the-art
- Adversarial malware binaries: Evading deep learning for malware detection in executables
- Analysis of machine learning approaches to packing detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Birds of a feature: Intrafamily clustering for version identification of packed malware
- Bypassing anti-analysis of commercial protector methods using DBI tools
- Learning to evade static PE machine learning malware models via reinforcement learning
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Detecting traditional packers, decisively
- Packer identification using byte plot and Markov plot
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Intriguing properties of neural networks
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Adversarial attacks against windows PE malware detection: A survey of the state-of-the-art
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Building a malware mutation tool
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Denial-of-service attacks on host-based generic unpackers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- BitBlaze: A new approach to computer security via binary analysis
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- A fine-grained classification approach for the packed malicious code
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- Adversarial learning on static detection techniques for executable packing
- Adversarial tool for breaking static detection of executable packing
- Analysis of machine learning approaches to packing detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- An application of machine learning to analysis of packed mac malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Building a malware mutation tool
- Building a mutation tool for binaries: Expanding a dynamic binary rewriting tool to obfuscate malwares
- Building a smart and automated tool for packed malware detections using machine learning
- Classification of packed executables for accurate computer virus detection
- Control flow-based opcode behavior analysis for malware detection
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Detecting unknown malicious code by applying classification techniques on opcode patterns
- DexHunter: Toward extracting hidden code from packed Android applications
- Dynamic binary instrumentation for deobfuscation and unpacking
- Effective, efficient, and robust packing detection and classification
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- An experimental study on identifying obfuscation techniques in packer
- Experimental toolkit for manipulating executable packing
- Experimental toolkit for studying executable packing - Analysis of the state-of-the-art packing detection techniques
- Feature selection for packer classification based on association rule mining
- A fine-grained classification approach for the packed malicious code
- Generating adversarial malware examples for black-box attacks based on GAN
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Hashing-based encryption and anti-debugger support for packing multiple files into single executable
- A heuristics-based static analysis approach for detecting packed PE binaries
- Highlighting the impact of packed executable alterations with unsupervised learning
- Identifying malware packers through multilayer feature engineering in static analysis
- Improving malware detection using multi-view ensemble learning
- Incremental clustering of malware packers using features based on transformed CFG
- A machine-learning-based framework for supporting malware detection and analysis
- Maitland: Analysis of packed and encrypted malware via paravirtualization extensions
- Mal-flux: Rendering hidden code of packed binary executable
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- MaliCage: A packed malware family classification framework based on DNN and GAN
- Malware detection through opcode sequence analysis using machine learning
- Malware family classification method based on static feature extraction
- Malware images: Visualization and automatic classification
- Malware makeover: Breaking ML-based static analysis by modifying executable bytes
- Malware obfuscation through evolutionary packers
- Metadata recovery from obfuscated programs using machine learning
- MLxPack: Investigating the effects of packers on ML-based malware detection systems using static and dynamic traits
- MSG: Missing-sequence generator for metamorphic malware detection
- Novel feature extraction, selection and fusion for effective malware family classification
- Obfuscation: Where are we in anti-DSE protections? (a first attempt)
- On deceiving malware classification with section injection
- On evaluating adversarial robustness
- On the (Im)possibility of obfuscating programs
- On the adoption of anomaly detection for packed executable filtering
- Opcode sequences as representation of executables for data-mining-based unknown malware detection
- Opcodes as predictor for malware
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packed code detection using shannon entropy and homomorphic encrypted executables
- Packer analysis report debugging and unpacking the NsPack 3.4 and 3.7 packer
- Packer classification based on association rule mining
- Packer classifier based on PE header information
- Packer identification based on metadata signature
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- PackGenome: Automatically generating robust YARA rules for accurate malware packer detection
- PackHero: A scalable graph-based approach for efficient packer identification
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- Pitfalls in machine learning for computer security
- PolyPack: An automated online packing service for optimal antivirus evasion
- Potent and stealthy control flow obfuscation by stack based self-modifying code
- Preprocessing of binary executable files towards retargetable decompilation
- Qualitative and quantitative evaluation of software packers
- RAMBO: Run-Time packer analysis with multiple branch observation
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- Renovo: A hidden code extractor for packed executables
- Research of software information hiding algorithm based on packing technology
- SE-PAC: A self-evolving packer classifier against rapid packers evolution
- Semi-supervised learning for unknown malware detection
- Sequential opcode embedding-based malware detection method
- SoK: Automatic deobfuscation of virtualization-protected applications
- Source-free binary mutation for offense and defense
- SPADE: Signature based packer detection
- Standards and policies on packer use
- Static analysis method on portable executable files for REMNUX based malware identification
- Static analysis of executables to detect malicious patterns
- Static features exploration for executable packing with unsupervised learning
- Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Technical report on the cleverhans v2.1.0 adversarial examples library
- Thwarting real-time dynamic unpacking
- Towards paving the way for large-scale Windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost
- Transcending transcend: Revisiting malware classification in the presence of concept drift
- Unknown malcode detection using OPCODE representation
- Unpacking malware in the real world: A step-by step guide
- Unpacking virtualization obfuscators
- Unsupervised clustering machine learning on packed executable
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- VMAttack: Deobfuscating virtualization-based packed binaries
- VMHunt: A verifiable approach to partially-virtualized binary code simplification
- WaveAtlas: Surfing through the landscape of current malware packers
- WYSINWYX: What you see is not what you execute
- Absent extreme learning machine algorithm with application to packed executable identification
- An accurate packer identification method using support vector machine
- Adaptive unpacking of Android Apps
- Advanced feature engineering for static detection of executable packing
- All-in-one framework for detection, unpacking, and verification for malware analysis
- Anti-unpacker tricks
- Application of string kernel based support vector machine for malware packer identification
- The application research of virtual machine in packers
- The arms race: Adversarial search defeats entropy used to detect malware
- Assessing the impact of packing on machine learning-based malware detection and classification systems
- Automatic analysis of malware behavior using machine learning
- Automatic generation of adversarial examples for interpreting malware classifiers
- Automatic static unpacking of malware binaries
- BareUnpack: Generic unpacking on the bare-metal operating system
- Binary-code obfuscations in prevalent packer tools
- BinStat tool for recognition of packed executables
- Boosting scalability in anomaly-based packed executable filtering
- ByteWise: A case study in neural network obfuscation identification
- Certified robustness of static deep learning-based malware detectors against patch and append attacks
- Challenging anti-virus through evolutionary malware obfuscation
- Classifying packed malware represented as control flow graphs using deep graph convolutional neural network
- Classifying packed programs as malicious software detected
- A close look at a daily dataset of malware samples
- Collective classification for packed executable identification
- A compact multi-step framework for packing identification in portable executable files for malware analysis
- Complexity-based packed executable classification with high accuracy
- A comprehensive solution for obfuscation detection and removal based on comparative analysis of deobfuscation tools
- Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)
- A control flow graph-based signature for packer identification
- Countering entropy measure attacks on packed software detection
- Dealing with virtualization packers
- Deceiving end-to-end deep learning malware detectors using adversarial examples
- Deceiving portable executable malware classifiers into targeted misclassification with practical adversarial examples
- Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
- Deobfuscation of packed and virtualization-obfuscation protected binaries
- Design and development of a new scanning core engine for malware detection
- Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering
- Detecting obfuscated malware using reduced opcode set and optimised runtime trace
- Detecting packed executable file: Supervised or anomaly detection method?
- Detecting packed executables based on raw binary data
- Detecting packed executables using steganalysis
- Detecting packed PE files: Executable file analysis for the Windows operating system
- Detection of metamorphic malware packers using multilayered LSTM networks
- Detection of packed executables using support vector machines
- Detection of packed malware
- Disabling anti-debugging techniques for unpacking system in user-level debugger
- DroidPDF: The obfuscation resilient packer detection framework for Android Apps
- Dynamic classification of packing algorithms for inspecting executables using entropy analysis
- A dynamic heuristic method for detecting packed malware using naive bayes
- Efficient automatic original entry point detection
- An efficient block-discriminant identification of packed malware
- Efficient malware packer identification using support vector machines with spectrum kernel
- Efficient SVM based packer identification with binary diffing measures
- ELF-Miner: Using structural knowledge and data mining methods to detect new (Linux) malicious executables
- EMBER: An open dataset for training static PE malware machine learning models
- An empirical evaluation of an unpacking method implemented with dynamic binary instrumentation
- Encoded executable file detection technique via executable file header analysis
- Enhancing machine learning based malware detection model by reinforcement learning
- ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
- Eureka: A framework for enabling static malware analysis
- Evading anti-malware engines with deep reinforcement learning
- Evading machine learning malware detection
- Experimental comparison of machine learning models in malware packing detection
- Exploring adversarial examples in malware detection
- Fast and robust fixed-point algorithms for independent component analysis
- A fast flowgraph based classification system for packed and polymorphic malware on the endhost
- A fast randomness test that preserves local detail
- Feature selection for malware detection based on reinforcement learning
- Feature set reduction for the detection of packed executables
- File packing from the malware perspective: Techniques, analysis approaches, and directions for enhancements
- Fileprints: Identifying file types by n-gram analysis
- Functionality-preserving black-box optimization of adversarial windows malware
- Generic packing detection using several complexity analysis for accurate malware detection
- Generic unpacking of self-modifying, aggressive, packed binary programs
- Generic unpacking techniques
- Generic unpacking using entropy analysis
- Gunpack: Un outil générique d'unpacking de malwares
- A heuristic approach for detection of obfuscated malware
- An implementation of a generic unpacking method on Bochs Emulator
- An improved method for packed malware detection using PE header and section table information
- Information theoretic method for classification of packed and encoded files
- Instructions-based detection of sophisticated obfuscation and packing
- Intriguing properties of adversarial ML attacks in the problem space
- A learning model to detect maliciousness of portable executable using integrated feature set
- Limits of static analysis for malware detection
- MAB-Malware: A reinforcement learning framework for attacking static malware classifiers
- Mal-EVE: Static detection model for evasive malware
- Malware analysis using multiple API sequence mining control flow graph
- Malware analysis using visualized images and entropy graphs
- Malware obfuscation techniques: A brief survey
- Malwise - An effective and efficient classification system for packed and polymorphic malware
- McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
- Memory behavior-based automatic malware unpacking in stealth debugging environment
- MetaAware: Identifying metamorphic malware
- MutantX-S: Scalable malware clustering based on static features
- The new signature generation method based on an unpacking algorithm and procedure for a packer detection
- Obfuscation-resilient executable payload extraction from packed malware
- Obfuscation: The hidden malware
- Obfuscator-LLVM: Software protection for the masses
- OmniUnpack: Fast, generic, and safe unpacking of malware
- An original entry point detection method with candidate-sorting for more effective generic unpacking
- Packer identification method based on byte sequences
- Packer identification method for multi-layer executables with k-Nearest neighbor of entropies
- Packer-complexity analysis in PANDA
- Packing detection and classification relying on machine learning to stop malware propagation
- Pandora's Bochs: Automatic unpacking of malware
- PE file features in detection of packed executables
- PE file header analysis-based packed PE file detection technique (PHAD)
- PE-Probe: Leveraging packer detection and structural information to detect malicious portable executables
- PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
- Practical attacks on machine learning: A case study on adversarial windows malware
- Prevalence and impact of low-entropy packing schemes in the malware ecosystem
- RePEconstruct: Reconstructing binaries with self-modifying code and import address table destruction
- RePEF — A system for restoring packed executable file for malware analysis
- Research and implementation of compression shell unpacking technology for PE file
- Research and implementation of packing technology for PE files
- Revealing packed malware
- Reverse engineering self-modifying code: Unpacker extraction
- Robust static analysis of portable executable malware
- Runtime packers testing experiences
- SATURN - Software deobfuscation framework based on LLVM
- SCORE: Source code optimization & reconstruction
- Secure and advanced unpacking using computer emulation
- Semi-supervised learning for packed executable detection
- Sensitive system calls based packed malware variants detection using principal component initialized multilayers neural networks
- SoK: (state of) the art of war: Offensive techniques in binary analysis
- SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers
- A survey on adversarial attacks for malware analysis
- A survey on machine learning-based detection and classification technology of malware
- A token strengthened encryption packer to prevent reverse engineering PE files
- Towards static analysis of virtualization-obfuscated binaries
- Tutorial: An overview of malware detection and evasion techniques
- Two techniques for detecting packed portable executable files
- Unconditional self-modifying code elimination with dynamic compiler optimizations
- Understanding linux malware
- A unpacking and reconstruction system-agunpacker
- Unpacking framework for packed malicious executables
- Unpacking techniques and tools in malware analysis
- UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
- Using entropy analysis to find encrypted and packed malware
- VMRe: A reverse framework of virtual machine protection packed binaries
- When malware is packin' heat; limits of machine learning classifiers based on static analysis features
- x64Unpack: Hybrid emulation unpacker for 64-bit Windows Environments and detailed analysis results on VMProtect 3.4
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Evading packing detection: Breaking heuristic-based static detectors
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
-
-
:package: Packers
-
Between 2000 and 2010
- tElock - Telock is a practical tool that intends to help developers who want to protect their work and reduce the size of the executable files.
- TTProtect - Professional protection tool designed for software developers to protect their PE applications against illegal modification or decompilation.
- UPack - Compresses Windows PE file.
- 20to4 - Executable compressor that is able to stuff about 20k of finest code and data into less than 4k.
- AverCryptor - Small and very handy utility designed to encrypt notes in which you can store any private information - it helps to hide your infection from antiviruses.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- CryptExec - Next-generation runtime binary encryption using on-demand function extraction.
- EXE Guarder - Licensing tool for PE files allowing to compress and specify a password notice.
- EXE Wrapper - Protects any EXE file with a password from non-authorized execution.
- FSG - *Fast Small Good*, perfect compressor for small exes, eg.
- Kkrunchy - Kkrunchy is a small exe packer primarily meant for 64k intros.
- NSPack - 32/64-bits exe, dll, ocx, scr Windows program compressor.
- PECompact - Windows executable compressor featuring third-party plug-ins offering protection against reverse engineering.
- RLPack - Compresses your executables and dynamic link libraries in a way that keeps them small and has no effect on compressed file functionality.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- WinUpack - Graphical interface for Upack, a command-line program used to create self-extracting archives from Windows PE files.
- XComp - PE32 image file packer and rebuilder.
- Yoda Crypter - Supports polymorphic encryption, softice detection, anti-debug API's, anti-dumping, etc, encrypts the Import Table and erases PE Header.
- Yoda Protector - Free, open source, Windows 32-bit software protector.
- Laturi - Linker and compressor intended to be used for macOS 1k, 4k and perhaps 64K intros.
- 20to4 - Executable compressor that is able to stuff about 20k of finest code and data into less than 4k.
- AverCryptor - Small and very handy utility designed to encrypt notes in which you can store any private information - it helps to hide your infection from antiviruses.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- CryptExec - Next-generation runtime binary encryption using on-demand function extraction.
- EXE Guarder - Licensing tool for PE files allowing to compress and specify a password notice.
- EXE Wrapper - Protects any EXE file with a password from non-authorized execution.
- FSG - *Fast Small Good*, perfect compressor for small exes, eg.
- HackStop - EXE and COM programs encrypter and protector.
- Kkrunchy - Kkrunchy is a small exe packer primarily meant for 64k intros.
- Laturi - Linker and compressor intended to be used for macOS 1k, 4k and perhaps 64K intros.
- NSPack - 32/64-bits exe, dll, ocx, scr Windows program compressor.
- PECompact - Windows executable compressor featuring third-party plug-ins offering protection against reverse engineering.
- RLPack - Compresses your executables and dynamic link libraries in a way that keeps them small and has no effect on compressed file functionality.
- RSCC - ROSE Super COM Crypt ; polymorph cryptor for files greater than 300-400B and smaller than 60kB.
- RUCC - ROSE Ultra COM Compressor ; COM and EXE compression utility based on 624.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- TTProtect - Professional protection tool designed for software developers to protect their PE applications against illegal modification or decompilation.
- UPX-Scrambler - Scrambler for files packed with UPX (up to 1.06) so that they cannot be unpacked with the '-d' option.
- x86.Virtualizer - x86 Virtualizer.
- XComp - PE32 image file packer and rebuilder.
- Yoda Crypter - Supports polymorphic encryption, softice detection, anti-debug API's, anti-dumping, etc, encrypts the Import Table and erases PE Header.
- Yoda Protector - Free, open source, Windows 32-bit software protector.
- ACProtect - Application that allows to protect Windows executable files against piracy, using RSA to create and verify the registration keys and unlock code.
- AHPack - PE and PE+ file packer.
- Application Protector - Tool for protecting Windows applications.
- AT4RE Protector - Very simple PE files protector programmed in ASM.
- ByteBoozer - Commodore 64 executable packer.
- Exe32Pack - Compresses Win32 EXEs, DLLs, etc and dynamically expands them upon execution.
- EXECryptor - Protects EXE programs from reverse engineering, analysis, modifications and cracking.
- ExeFog - Simple Win32 PE files packer.
- eXPressor - Used as a compressor this tool can compress EXE files to half their normal size.
- GHF Protector - Executable packer / protector based on open source engines Morphine and AHPack.
- mPack - mPack - mario PACKersimple Win32 PE Executable compressor.
- NTPacker - PE file packer relying on aPlib for compression and/or XOR for encryption.
- RDMC - DMC algorithm based packer.
- Sentinel HASP Envelope - Wrapping application that protects the target application with a secure shield, providing a means to counteract reverse engineering and other anti-debugging measures.
- sePACKER - Simple Executable Packer is compressing executables' code section inorder to decrease size of binary files.
-
After 2010
- Alienyze - Advanced software protection and security for Windows 32-bit executables.
- Andromeda - Custom packer used in malware campaigns using RunPE techniques for evading AV mitigation methods.
- APKProtect - APK encryption and shell protection supporting Java and C++.
- Armadillo - Incorporates both a license manager and wrapper system for protecting PE files.
- ASPack - Advanced solution created to provide Win32 EXE file packing and to protect them against non-professional reverse engineering.
- ASProtect 32 - Multifunctional EXE packing tool designed for software developers to protect 32-bit applications with in-built application copy protection system.
- ASProtect 64 - Tool for protecting 64-bit applications and .NET applications for Windows against unauthorized use, industrial and home copying, professional hacking and analysis of software products distributed over the Internet and on any physical media.
- Bero - Bero EXE Packer (BEP) for 32-bit windows executables.
- BIN-crypter - EXE protection software against crackers and decompilers.
- BoxedApp Packer
- DexGuard - Android app obfuscation & security protocols for mobile app protection.
- ElecKey - Suite of software and tools that offer a complete solution for software protection, copy protection, and license management.
- Enigma Protector - Professional system for executable files licensing and protection.
- Enigma Virtual Box - Application virtualization system for Windows.
- EXE Stealth - Anti-cracking protection and licensing tool for PE files featuring compression and encryption polymorphic technology.
- GzExe - Utility that allows to compress executables as a shell script.
- LIAPP - Easiest and most powerful mobile app security solution.
- LM-X License Manager - LM-X License Manager lets you protect your products against piracy by enforcing various levels of security, save time, and reduce business risks.
- NPack - Can compress 32bits and 64bits exe, dll, ocx, scr Windows program.
- Obsidium - Feature-rich professional software protection and licensing system designed as a cost effective and easy to implement, yet reliable and non-invasive way to protect your 32- and 64-bit Windows software applications and games from reverse engineering.
- PELock - Software protection system for Windows executable files ; protects your applications from tampering and reverse engineering, and provides extensive support for software license key management, including support for time trial periods.
- RapidEXE - Simple and efficient way to convert a PHP/Python script to a standalone executable.
- Smart Packer - Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Squishy - Modern packer developed for 64kb demoscene productions, targets 32bit and 64bit executables.
- UPX - Ultimate Packer for eXecutables.
- ZProtect - Renames metadata entities and supports advanced obfuscation methods that harden protection scheme and foil reverse engineering altogether.
- Alienyze - Advanced software protection and security for Windows 32-bit executables.
- Andromeda - Custom packer used in malware campaigns using RunPE techniques for evading AV mitigation methods.
- APKProtect - APK encryption and shell protection supporting Java and C++.
- Armadillo - Incorporates both a license manager and wrapper system for protecting PE files.
- ASM Guard - Packer utility for compressing and complicating reversing compiled native code (native files), protecting resources, adding DRM, and packing into an optimized loader.
- ASPack - Advanced solution created to provide Win32 EXE file packing and to protect them against non-professional reverse engineering.
- ASProtect 32 - Multifunctional EXE packing tool designed for software developers to protect 32-bit applications with in-built application copy protection system.
- ASProtect 64 - Tool for protecting 64-bit applications and .NET applications for Windows against unauthorized use, industrial and home copying, professional hacking and analysis of software products distributed over the Internet and on any physical media.
- Astral-PE - Low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64).
- AutoIT - Legitimate executable encryption service.
- BangCle - Protection tool using the second generation Android Hardening Protection, loading the encrypted DEX file from memory dynamically.
- BIN-crypter - EXE protection software against crackers and decompilers.
- BoxedApp Packer
- DexGuard - Android app obfuscation & security protocols for mobile app protection.
- ElecKey - Suite of software and tools that offer a complete solution for software protection, copy protection, and license management.
- ELF Packer - Encrypts 64-bit elf files that decrypt at runtime.
- Enigma Protector - Professional system for executable files licensing and protection.
- EXE Stealth - Anti-cracking protection and licensing tool for PE files featuring compression and encryption polymorphic technology.
- GzExe - Utility that allows to compress executables as a shell script.
- hXOR-Packer - PE packer with Huffman compression and XOR encryption.
- Hyperion
- LIAPP - Easiest and most powerful mobile app security solution.
- LM-X License Manager - LM-X License Manager lets you protect your products against piracy by enforcing various levels of security, save time, and reduce business risks.
- m0dern_p4cker - Just a modern packer for elf binaries ( works on linux executables only ).
- MidgetPack - Midgetpack is a binary packer for ELF binaries, such as burneye, upx or other tools.
- NetCrypt - A proof-of-concept packer for .NET executables, designed to provide a starting point to explain the basic principles of runtime packing.
- Obsidium - Feature-rich professional software protection and licensing system designed as a cost effective and easy to implement, yet reliable and non-invasive way to protect your 32- and 64-bit Windows software applications and games from reverse engineering.
- Origami - Packer compressing .net assemblies, (ab)using the PE format for data storage.
- OS-X_Packer - Binary packer for the Mach-O file format.
- Pakkero - Pakkero is a binary packer written in Go made for fun and educational purpose.
- Pakr - In-memory packer for macOS Mach-O bundles.
- Papaw - Permissively-licensed packer for ELF executables using LZMA Zstandard or Deflate compression.
- PE-Packer - Simple packer for Windows 32-bits PE files.
- PE-Toy - A PE file packer.
- PELock - Software protection system for Windows executable files ; protects your applications from tampering and reverse engineering, and provides extensive support for software license key management, including support for time trial periods.
- PePacker - Simple PE Packer Which Encrypts .text Section I release a simple PE file packer which encrypts the .text section and adds a decryption stub to the end of the last section.
- PEzor - Open-Source Shellcode & PE Packer.
- ProtectMyTooling - Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry.
- RapidEXE - Simple and efficient way to convert a PHP/Python script to a standalone executable.
- Silent-Packer - Silent Packer is an ELF / PE packer written in pure C.
- Simple-PE32-Packer - Simple PE32 Packer with aPLib compression library.
- SimpleDPack - A very simple windows EXE packing tool for learning or investigating PE structure.
- Smart Packer - Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Squishy - Modern packer developed for 64kb demoscene productions, targets 32bit and 64bit executables.
- theArk - Windows x86 PE Packer In C++.
- VirtualMachineObfuscationPoC - Obfuscation method using virtual machine.
- Ward - Simple implementation of an ELF packer that creates stealthy droppers for loading malicious ELFs in-memory.
- Woody Wood Packer - ELF packer - encrypt and inject self-decryption code into executable ELF binary target.
- xorPacker - Simple packer working with all PE files which cipher your exe with a XOR implementation.
- ZProtect - Renames metadata entities and supports advanced obfuscation methods that harden protection scheme and foil reverse engineering altogether.
- Alternate EXE Packer - Compression tool for executable files (type EXE) or DLL's relying on UPX 3.96.
- Amber - Position-independent(reflective) PE loader that enables in-memory execution of native PE files(EXE, DLL, SYS).
- AxProtector - Encrypts the complete software you aim to protect, and shields it with a security shell, AxEngine, best-of-breed anti-debugging and anti-disassembly methods are then injected into your software.
- Code Virtualizer - Code Virtualizer is a powerful code obfuscation system for Windows, Linux and macOS applications that helps developers to protect their sensitive code areas against Reverse Engineering with very strong obfuscation code, based on code virtualization.
- ConfuserEx - An open-source, free protector for .NET applications.
- Crinkler - Compressing linker for Windows, specifically targeted towards executables with a size of just a few kilobytes.
- DarkCrypt - Simply and powerful plugin for Total Commander used for file encryption using 100 algorithms and 5 modes.
- DexProtector - Multi-layered RASP solution that secures your Android and iOS apps against static and dynamic analysis, illegal use and tampering.
- DotBundle - GUI tool to compress, encrypt ad password-protect a .NET application or embed .NET libraries.
- DotNetZ - Straightforward and lightweight, command-line piece of software written in C that allows you to compress and pack Microsoft .NET Framework executable files.
- ELFCrypt - Simple ELF crypter using RC4 encryption.
- ELFuck - ELF packer for i386 original version from sk2 by sd.
- Eronona-Packer - This is a packer for exe under win32.
- EXE Bundle - Bundles application files into a single PE32 file.
- Ezuri - A Simple Linux ELF Runtime Crypter.
- MPRESS - Compresses (using LZMA) and protects PE, .NET or Mach-O programs against reverse engineering.
- .netshrink - Executable compressor for your Windows or Linux .NET application executable file using LZMA.
- PEShield - PE-SHiELD is a program, which encrypts 32-bit Windows EXE files, leaving them still executable.
- PESpin
- PEtite - Free Win32 (Windows 95/98/2000/NT/XP/Vista/7/etc) executable (EXE/DLL/etc) compressor.
- PEzoNG - Framework for automatically creating stealth binaries that target a very low detection rate in a Windows environment.
- Themida - From Renovo paper: Themida converts the original x86 instructions into virtual instructions in its own randomized instruction set, and then interpret these virtual instructions at run-time.
- VMProtect - VMProtect protects code by executing it on a virtual machine with non-standard architecture that makes it extremely difficult to analyze and crack the software.
-
Before 2000
- 32Lite - Compression tool for executable files created with Watcom C/C++ compiler.
- 624 - COM packer that can compress COM programs shorter than 25000 bytes.
- aPack - 16-bit real-mode DOS executable ( .EXE and .COM ) compressor.
- AVPack - Encrypts EXE or COM files so that they'll be able to start on your PC only.
- AXE - Program compression utility.
- CauseWay Compressor - DOS EXE compressor.
- CEXE - Compresses an input EXE into a smaller executable (only runs on WinNT, Win2000 and above - won't run on Win95 or Win98).
- EPack - EXE and COM file compressor ; works with DOS/Windows95 files.
- Fire-Pack
- LGLZ - DOS EXE and COM file compressor using modified LZ77.
- Megalite - MS-DOS executable file compressor.
- Morphine - Application for PE files encryption.
- Neolite - Compresses Windows 32-bit EXE files and DLLs.
- PACK - Executable files compressor.
- Pack-Ice
- PCShrink - Windows 9x/NT executable file compressor relying on the aPLib compression library.
- PE Diminisher - Simple PE packer relying on the aPLib compression library.
- PE-Protector - Encrypter/protector for Windows 9x/ME to protect executable files PEagainst reverse engineering or cracking with a very strong protection.
- PEBundle - Physically attaches DLL(s) to an executable, resolving dependencies in memory.
- PEPack - PE compression tool based on the code of a newer version of PE-SHiELD.
- Pro-Pack - DOS executable file compressor.
- SecuPack - Win32 executable compressor.
- Shrinker - Compresses (up to 70%) 16 and 32 bit Windows and real mode DOS programs.
- SysPack - Device drivers compressor.
- T-Pack - Executable COM-FILE compressor (LZ77) optimized for small files like BBS-Addys or similar files.
- TinyProg - EXE and COM programs compressor.
- Vacuum - Runtime Compressor for DOS32 executables.
- XPA - DOS executable packer.
- SecuPack - Win32 executable compressor.
- 32Lite - Compression tool for executable files created with Watcom C/C++ compiler.
- 624 - COM packer that can compress COM programs shorter than 25000 bytes.
- ABK Scrambler - COM file scrambler and protector recoded from ABKprot.
- AEP - Addition Encode-Protective for COM and EXE file.
- AINEXE - DOS executable packer (part of the AIN Archiver suite).
- aPack - 16-bit real-mode DOS executable ( .EXE and .COM ) compressor.
- AVPack - Encrypts EXE or COM files so that they'll be able to start on your PC only.
- AXE - Program compression utility.
- BIN-Lock - COM file scrambler for preventing reverse engineering.
- BitLok - COM and EXE file protector.
- C0NtRiVER - COM file encryptor.
- CauseWay Compressor - DOS EXE compressor.
- CC Pro - COM and EXE executable file compression utility.
- CEXE - Compresses an input EXE into a smaller executable (only runs on WinNT, Win2000 and above - won't run on Win95 or Win98).
- COMProtector - Adds a security envelope around DOS .COM files by randomly encrypting it and adding several anti-debugging tricks.
- CrackStop - Tool that creates a security envelope around a DOS EXE file to protect it against crackers.
- Crunch - File encryptor for COM and EXE files.
- EPack - EXE and COM file compressor ; works with DOS/Windows95 files.
- ExeGuard - DOS EXE files free protector using anti-debugging ticks to prevent hacking, analysis and unpacking.
- EXELOCK 666 - Utility for protecting .EXE files so no lamers can hack out the copyright.
- Fire-Pack
- FSE - Final Fantasy Security Envelope freeware for protecting COM and EXE progams.
- Gardian Angel - COM and EXE encrypter and protector using a variety of anti-debugging tricks.
- JMCryptExe - DOS EXE encrypter.
- LGLZ - DOS EXE and COM file compressor using modified LZ77.
- LzExe - MS-DOS executable file compressor.
- Mask - Tool that prevents COM program from being cracked by using encryption and anti-debugging tricks.
- Megalite - MS-DOS executable file compressor.
- Mess - This tool does the same as HackStop, with the exception that it is freeware for non-commercial use.
- Morphine - Application for PE files encryption.
- Neolite - Compresses Windows 32-bit EXE files and DLLs.
- PACK - Executable files compressor.
- Pack-Ice
- PCShrink - Windows 9x/NT executable file compressor relying on the aPLib compression library.
- PE Diminisher - Simple PE packer relying on the aPLib compression library.
- PE-Protector - Encrypter/protector for Windows 9x/ME to protect executable files PEagainst reverse engineering or cracking with a very strong protection.
- PEBundle - Physically attaches DLL(s) to an executable, resolving dependencies in memory.
- PEPack - PE compression tool based on the code of a newer version of PE-SHiELD.
- PKlite - Easy-to-use file compression program for compressing DOS and Windows executable files.
- Pro-Pack - DOS executable file compressor.
- Scorpion - EXE and COM file encrypter and protector.
- SecuPack - Win32 executable compressor.
- $PIRIT - COM/EXE executable files polymorphic encryptor.
- SysPack - Device drivers compressor.
- T-Pack - Executable COM-FILE compressor (LZ77) optimized for small files like BBS-Addys or similar files.
- TRAP - EXE and COM files encrypter and protector.
- Vacuum - Runtime Compressor for DOS32 executables.
- WWPack - Squeezes EXE files, compresses relocation tables, optimizes headers, protects EXE files from hacking.
- XE - PE32 image file packer and rebuilder.
- XorCopy - COM file XOR-based encrypter.
- XORER - COM file XOR-based encrypter.
- XPA - DOS executable packer.
- XPack - EXE/COM/SYS executable file compressor.
- RERP - ROSE's EXE Relocation Packer.
- RJCrush - EXE and COM files compressor with the ability to compress overlays.
- SPack
- WinLite - Compresses Windows executables (such as Pklite, Diet or Wwpack) for executables programs under DOS.
-
-
:bookmark_tabs: Datasets
-
Scientific Research
- ViruSign - Another online malware database.
- VirusShare - Virus online database with more than 44 millions of samples.
- VX Underground - PL-CERT based open source MWDB python application holding a malware database containing every APT sample from 2010 and over 7.5M maliciousbinaries.
- VXvault - Online malware database.
- WildList - Cooperative listing of malwares reported as being in the wild by security professionals.
- Contagio - Contagio is a collection of the latest malware samples, threats, observations, and analyses.
- Malfease - Dataset of about 5,000 packed malware samples.
- Malheur - Contains the recorded behavior of malicious software (malware) and has been used for developing methods for classifying and clustering malware behavior (see the JCS article from 2011).
- Malicia - Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- MalShare - Free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
- The Malware Museum - The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers.
- MalwareBazaar - Project operated by abuse.ch aimed to collect and share malware samples, helping IT-security researchers and threat analysts protecting their constituency and customers from cyber threats.
- MalwareGallery - Yet another malware collection in the Internet.
- MalwareTips - MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats.
- OARC Malware Dataset - Semi-public dataset of 3,467 samples captured in the wild from Sep 2005 to Jan 2006 by mail traps, user submissions, honeypots and other sources aggregated by the OARC, available to qualified academic and industry researchers upon request.
- Open Malware Project - Online collection of malware samples (formerly Offensive Computing).
- Malicia - Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- Dataset of Packed ELF - Dataset of packed ELF samples.
- Dataset of Packed PE - Sanitized version of the original dataset, PackingData, removing packed samples from the Notpacked folder but also samples in packer folders that failed to be packed (having a same hash as the original unpacked executable).
- Ember - Collection of features from PE files that serve as a benchmark dataset for researchers.
- FFRI Dataset Scripts - Make datasets like FFRI Dataset.
- SOREL - Sophos-ReversingLabs 20 Million dataset.
- MalwareSamples - Bringing you the best of the worst files on the Internet.
- VirusSamples
- BODMAS - Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
- Contagio - Contagio is a collection of the latest malware samples, threats, observations, and analyses.
- Dataset of Packed ELF - Dataset of packed ELF samples.
- Dataset of Packed PE - Sanitized version of the original dataset, PackingData, removing packed samples from the Notpacked folder but also samples in packer folders that failed to be packed (having a same hash as the original unpacked executable).
- Malfease - Dataset of about 5,000 packed malware samples.
- Malheur - Contains the recorded behavior of malicious software (malware) and has been used for developing methods for classifying and clustering malware behavior (see the JCS article from 2011).
- Malicia - Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- MalShare - Free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
- Malware Archive - Malware samples, analysis exercises and other interesting resources.
- MalwareBazaar - Project operated by abuse.ch aimed to collect and share malware samples, helping IT-security researchers and threat analysts protecting their constituency and customers from cyber threats.
- MalwareGallery - Yet another malware collection in the Internet.
- MalwareTips - MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats.
- OARC Malware Dataset - Semi-public dataset of 3,467 samples captured in the wild from Sep 2005 to Jan 2006 by mail traps, user submissions, honeypots and other sources aggregated by the OARC, available to qualified academic and industry researchers upon request.
- ViruSign - Another online malware database.
- VirusSamples - Best of the worst kind of files on the Internet.
- VirusShare - Virus online database with more than 44 millions of samples.
- VirusSign - Giant database dedicated to combating malware in the digital world.
- VirusTotal - File analysis Web service for detecting malware.
- VX Underground - PL-CERT based open source MWDB python application holding a malware database containing every APT sample from 2010 and over 7.5M maliciousbinaries.
- VXvault - Online malware database.
- WildList - Cooperative listing of malwares reported as being in the wild by security professionals.
- CyberCrime - C² tracking and malware database.
- MaleX - Curated dataset of malware and benign Windows executable samples for malware researchers containing 1,044,394 Windows executable binaries and corresponding image representations with 864,669 labelled as malware and 179,725 as benign.
- PackingData - Original dataset with sample PE files packed with a large variety of packers, including ASPack, BeRoEXEPacker, exe32pack, eXpressor, FSG, JDPack, MEW, Molebox, MPRESS, Neolite, NSPack, Pckman, PECompact, PEtite, RLPack, UPX, WinUpack, Yoda's Crypter and Yoda's Protector.
- Packware - Datasets and codes that are needed to reproduce the experiments in the paper "When Malware is Packing Heat".
- RCE Lab - Crackme's, keygenme's, serialme's ; the "tuts4you" folder contains many packed binaries.
- Runtime Packers Testset - Dataset of 10 common Malware files, packed with about 40 different runtime packers in over 500 versions and options, with a total of about 5,000 samples.
- SAC - Slovak Antivirus Center, non-commercial project of AVIR and ESET companies ; contains packers, detectors and unpackers.
- theZoo - Project created to make the possibility of malware analysis open and available to the public.
- VX Heaven - Site dedicated to providing information about computer viruses.
-
-
:wrench: Tools
-
Before 2000
- aPLib - Compression library based on the algorithm used in aPACK.
- Assiste (Packer) - Assiste.com's example list of packers.
- BitBlaze - Analysis platform that features a novel fusion of static and dynamic analysis techniques, mixed concrete and symbolic execution, and whole-system emulation and binary instrumentation, all to facilitate state-of-the art research on real security problems.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- CFF Explorer - PE32/64 and .NET editor, part of the Explorer Suite.
- ChkEXE - Identifies almost any EXE/COM packer, crypter or protector.
- Clamscan Unpacker - Unpacker derived from ClamAV.
- DynamoRIO - Runtime code manipulation system that supports code transformations on any part of a program, while it executes.
- EtherUnpack - Precision universal automated unpacker (successor of PolyUnpack).
- Eureka - Binary static analysis preparation framework implementing a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing.
- EXETools - Forum for reverse engineering and executale packing related topics.
- GetTyp - File format detection program for DOS based on special strings and byte code.
- GUnpacker - Shell tool that performs OEP positioning and dumps decrypted code.
- Language 2000 - Ultimate compiler detection utility.
- MRC - (Mandiant Red Curtain) Free software for Incident Responders that assists with the analysis of malware ; it examines executable files (e.g., .exe, .dll, and so on) to determine how suspicious they are based on a set of criteria.
- PackerBreaker - Tool for helping unpack, decompress and decrypt most of the programs packed, compressed or encrypted using advanced emulation technology.
- PCjs - PCjs uses JavaScript to recreate the IBM PC experience, using original ROMs, CPUs running at their original speeds, and early IBM video cards and monitors.
- PE Compression Test - List of packers tested on a few sample executables for comparing compressed sizes.
- PE Detective - This GUI tool can scan single PE files or entire directories (also recursevely) and generate complete reports.
- PEdump - Dump windows PE files using Ruby.
- Pefeats - Utility for extracting 119 features from a PE file for use with machine learning algorithms.
- PEiD - Packed Executable iDentifier.
- PEscan - CLI tool to scan PE files to identify how they were constructed.
- PEview - Provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
- PExplorer - Most feature-packed program for inspecting the inner workings of your own software, and more importantly, third party Windows applications and libraries for which you do not have source code.
- Pin - Dynamic binary instrumentation framework for the IA-32, x86-64 and MIC instruction-set architectures that enables the creation of dynamic program analysis tools.
- PROTECTiON iD - PE file signature-based scanner.
- Quick Unpack - Generic unpacker that facilitates the unpacking process.
- RDG Packer Detector - Packer detection tool.
- REMnux - Linux toolkit for reverse-engineering and analyzing malicious software.
- ResourceHacker - Resource editor for 32bit and 64bit Windows applications.
- RTD - Rose Patch - TinyProt/Rosetiny Unpacker.
- StudPE - PE viewer and editor (32/64 bit).
- Titanium Platform - Machine learning hybrid cloud platform that harvests thousands of file types at scale, speeds threat detection through machine learning binary analysis, and continuously monitors an index of over 10B files for future threats.
- Tuts 4 You - Non-commercial, independent community dedicated to the sharing of knowledge and information on reverse code engineering.
- UnpacMe - Automated malware unpacking service.
- Uunp (IDA Pro plugin) - IDA Pro debugger plug-in module automating the analysis and unpacking of packed binaries.
- VMUnpacker - Unpacker based on the technology of virtual machine.
- OmniUnpack - New technique for fast, generic, and safe unpacking of malware by monitoring the execution in real-time and detecting the removed layers of packing.
- REMINDer - Packing detection tool based on the entropy value of the entry point section and the WRITE attribute.
- ProTools - Programmer's Tools, a web site dedicated for all kinds of tools and utilities for the true WinBloze programmer, including packers, crypters, etc.
- ResourceHacker - Resource editor for 32bit and 64bit Windows applications.
- RDG Packer Detector - Packer detection tool.
- Android Unpacker - Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0.
- Angr - Platform-agnostic binary analysis framework.
- APKiD - Android application Identifier for packers, protectors, obfuscators and oddities - PEiD for Android.
- AppSpear - Universal and automated unpacking system suitable for both Dalvik and ART.
- Assiste (Packer) - Assiste.com's example list of packers.
- AVClass - Python tools to tag / label malware samples.
- Bintropy - Prototype analysis tool that estimates the likelihood that a binary file contains compressed or encrypted bytes.
- BinUnpack - Unpacking approach free from tedious memory access monitoring, therefore introducing very small runtime overhead.
- Binutils - The GNU Binutils are a collection of binary tools for Linux (it namely includes Readelf).
- BitBlaze - Analysis platform that features a novel fusion of static and dynamic analysis techniques, mixed concrete and symbolic execution, and whole-system emulation and binary instrumentation, all to facilitate state-of-the art research on real security problems.
- Capa - Open-source tool to identify capabilities in PE, ELF or .NET executable files.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- Cave-Finder - Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files.
- ChkEXE - Identifies almost any EXE/COM packer, crypter or protector.
- Clamscan Unpacker - Unpacker derived from ClamAV.
- COM2EXE - Free tool for converting COM files to EXE format.
- de4js - JavaScript Deobfuscator and Unpacker.
- DSFF - DataSet File Format for exchanging datasets and converting to ARFF (for use with Weka), CSV or Packing-Box's dataset structure.
- DynamoRIO - Runtime code manipulation system that supports code transformations on any part of a program, while it executes.
- EtherUnpack - Precision universal automated unpacker (successor of PolyUnpack).
- Eureka - Binary static analysis preparation framework implementing a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing.
- EXEInfo-PE - Fast detector for executable PE files.
- EXETools - Forum for reverse engineering and executale packing related topics.
- FUU - Fast Universal Unpacker.
- GUnpacker - Shell tool that performs OEP positioning and dumps decrypted code.
- Gym-Malware - This is a malware manipulation environment for OpenAI's gym.
- IDR - Interactive Delphi Reconstructor.
- Language 2000 - Ultimate compiler detection utility.
- LIEF - Library to Instrument Executable Formats ; Python package for parsing PE, ELF, Mach-O and DEX formats, modifying and rebuilding executables.
- Malheur - Tool for the automatic analysis of malware behavior (recorded from malicious software in a sandbox environment).
- MalUnpack - Dynamic unpacker based on PE-sieve.
- Manalyze - Robust parser for PE files with a flexible plugin architecture which allows users to statically analyze files in-depth.
- MRC - (Mandiant Red Curtain) Free software for Incident Responders that assists with the analysis of malware ; it examines executable files (e.g., .exe, .dll, and so on) to determine how suspicious they are based on a set of criteria.
- .NET Deobfuscator - List of .NET Deobfuscators and Unpackers.
- NotPacked++ - Attack tool for altering packed samples so that they evade static packing detection.
- Oedipus - A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.
- OllyDbg Scripts - Collection of OllyDbg scripts for unpacking many different packers.
- OmniUnpack - New technique for fast, generic, and safe unpacking of malware by monitoring the execution in real-time and detecting the removed layers of packing.
- PackerAttacker - Tool that uses memory and code hooks to detect packers.
- PackerBreaker - Tool for helping unpack, decompress and decrypt most of the programs packed, compressed or encrypted using advanced emulation technology.
- PackerGrind - Adaptive unpacking tool for tracking packing bahaviors and unpacking Android packed apps.
- PackerID - Fork of packerid.py using PEid signatures and featuring additional output types, formats, digital signature extraction, and disassembly support.
- PackID - Packer identification multiplatform tool/library using the same database syntax as PEiD.
- Packing-Box - Docker image gathering many packing-related tools and for making datasets of packed executables for use with machine learning.
- PANDA - Platform for Architecture-Neutral Dynamic Analysis.
- PCjs - PCjs uses JavaScript to recreate the IBM PC experience, using original ROMs, CPUs running at their original speeds, and early IBM video cards and monitors.
- PE Compression Test - List of packers tested on a few sample executables for comparing compressed sizes.
- PE Detective - This GUI tool can scan single PE files or entire directories (also recursevely) and generate complete reports.
- PE-bear - Freeware reversing tool for PE files aimed to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.
- Pefile - Multi-platform Python module to parse and work with Portable Executable files.
- PEFrame - Tool for performing static analysis on PE malware and generic suspicious files.
- PEiD - Packed Executable iDentifier.
- PEiD (CLI) - Python implementation of PEiD featuring an additional tool for making new signatures.
- PEiD (yara) - Yet another implementation of PEiD with yara.
- PeLib - PE file manipulation library.
- PEPack - PE file packer detection tool, part of the Unix package "pev".
- PETools - Old-school reverse engineering tool (with a long history since 2002) for manipulating PE files.
- PEview - Provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
- PExplorer - Most feature-packed program for inspecting the inner workings of your own software, and more importantly, third party Windows applications and libraries for which you do not have source code.
- PINdemonium - Unpacker for PE files exploiting the capabilities of PIN.
- PolyUnpack - Implemention attempt of the general approach for extracting the original hidden code of PE files without any heuristic assumptions.
- PROTECTiON iD - PE file signature-based scanner.
- ProTools - Programmer's Tools, a web site dedicated for all kinds of tools and utilities for the true WinBloze programmer, including packers, crypters, etc.
- PyPackerDetect - Small python script/library to detect whether an executable is packed.
- PyPackerDetect (refactored) - A complete refactoring of the original project to a Python package with a console script to detect whether an executable is packed.
- PyPeid - Yet another implementation of PEiD with yara-python.
- Quick Unpack - Generic unpacker that facilitates the unpacking process.
- RDG Packer Detector - Packer detection tool.
- Reko - Free decompiler for machine code binaries.
- REMINDer - Packing detection tool based on the entropy value of the entry point section and the WRITE attribute.
- Renovo - Detection tool built on top of TEMU (dynamic analysis component of BitBlaze) based on the execution of newly-generated code and monitoring memory writes after the program starts.
- ResourceHacker - Resource editor for 32bit and 64bit Windows applications.
- RetDec - Retargetable machine-code decompiler based on LLVM.
- SecML Malware - Create adversarial attacks against machine learning Windows malware detectors.
- ShowStopper - Tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
- StudPE - PE viewer and editor (32/64 bit).
- Titanium Platform - Machine learning hybrid cloud platform that harvests thousands of file types at scale, speeds threat detection through machine learning binary analysis, and continuously monitors an index of over 10B files for future threats.
- Triton - Dynamic binary analysis library.
- Tuts 4 You - Non-commercial, independent community dedicated to the sharing of knowledge and information on reverse code engineering.
- Unipacker - Automatic and platform-independent unpacker for Windows binaries based on emulation.
- UnpacMe - Automated malware unpacking service.
- Uunp (IDA Pro plugin) - IDA Pro debugger plug-in module automating the analysis and unpacking of packed binaries.
- VMHunt - Set of tools for analyzing virtualized binary code ; now only supports 32 bit traces.
- VMUnpacker - Unpacker based on the technology of virtual machine.
- Winbindex - An index of Windows binaries, including download links for executables such as EXE, DLL and SYS files.
- yarGen - Generator for YARA rules - The main principle is the creation of yara rules from strings found in malware files while removing all strings that also appear in goodware files.
- Defacto2 Analyzers Archive - Collection of 60 binary files analysers for MS-DOS and Windows32 from the 1990s and the 2000s.
- Defacto2 Packers Archive - Collection of 460 binary and data file packers for MS-DOS and Windows32 from the 1990s and 2000s.
- Defacto2 Unpackers Archive - Collection of 152 binary files unpackers for MS-DOS and Windows 32 from the 1990s and 2000s.
- DIE - Detect It Easy ; Program for determining types of files.
- Emulator - Symantec Endpoint Protector (from v14) capability to create a virtual machine on the fly to identify, detonate, and eliminate malware hiding inside custom malware packers.
- ExeScan - Executable file analyzer which detects the most famous EXE/COM Protectors, Packers, Converters and compilers.
- ImpREC - This can be used to repair the import table for packed programs.
- Justin - Just-In-Time AV scanning ; generic unpacking solution.
- LordPE - PE header viewer, editor and rebuilder.
- OEPdet - Automated original-entry-point detector.
- Pandora's Bochs - Extension to the Bochs PC eumlator to enable it to monitor execution of the unpacking stubs for extracting the original code.
- RUPP - ROSE SWE UnPaCKER PaCKaGE (for DOS executables only).
- SymPack - Safe, portable, largely effective but not generic library for packing detection and unpacking ; part of the Norton Antivirus solution.
- TrID - Utility for identifying file types from their binary signatures.
- Unpckarc - Packed executables detection tool relying on several heuristics.
- UU - Universal Unpacker.
- Uundo - Universal Undo - Universal Unpacker.
- UUP - Universal exe-file UnPacker.
-
Programming Languages
Categories
Sub Categories
Keywords
malware-analysis
10
reverse-engineering
9
malware-research
8
binary-analysis
5
malware
5
packer
4
unpacker
4
machine-learning
3
pe-file
3
dotnet
3
python
3
android
3
upx
3
qemu
2
malware-detection
2
dataset
2
portable-executable
2
pe-format
2
elf-binaries
2
yara
2
executable-packing
2
encryption
2
malware-packers
2
deobfuscator
2
samples
2
x86-64
2
windows
2
security
2
c
2
analysis
2
elf
2
disassembler
2
malwareanalysis
2
malware-samples
2
dumper
2
pefile
2
packers
2
lief
1
macho
1
modification
1
oat
1
parser
1
parsing
1
pe
1
training
1
pcaps
1
rust
1
sdk
1
vdex
1
angr
1