awesome-executable-packing
A curated list of awesome resources related to executable packing
https://github.com/packing-box/awesome-executable-packing
Last synced: 3 days ago
JSON representation
-
:books: Literature
-
Scientific Research
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- RAMBO: Run-Time packer analysis with multiple branch observation
- A survey on run-time packers and mitigation techniques
- All-in-one framework for detection, unpacking, and verification for malware analysis
- Analysis of machine learning approaches to packing detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Anti-unpacker tricks
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- ByteWise: A case study in neural network obfuscation identification
- Classification of packed executables for accurate computer virus detection
- Dealing with virtualization packers
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Detection of metamorphic malware packers using multilayered LSTM networks
- DexHunter: Toward extracting hidden code from packed Android applications
- Dynamic binary instrumentation for deobfuscation and unpacking
- Effective, efficient, and robust packing detection and classification
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fast flowgraph based classification system for packed and polymorphic malware on the endhost
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Hashing-based encryption and anti-debugger support for packing multiple files into single executable
- A heuristics-based static analysis approach for detecting packed PE binaries
- Maitland: Analysis of packed and encrypted malware via paravirtualization extensions
- Mal-flux: Rendering hidden code of packed binary executable
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Malware makeover: Breaking ML-based static analysis by modifying executable bytes
- On deceiving malware classification with section injection
- On the (Im)possibility of obfuscating programs
- On the adoption of anomaly detection for packed executable filtering
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer analysis report debugging and unpacking the NsPack 3.4 and 3.7 packer
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- Preprocessing of binary executable files towards retargetable decompilation
- Qualitative and quantitative evaluation of software packers
- RAMBO: Run-Time packer analysis with multiple branch observation
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Standards and policies on packer use
- Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- WaveAtlas: Surfing through the landscape of current malware packers
- SoK: Automatic deobfuscation of virtualization-protected applications
- Static analysis of executables to detect malicious patterns
- A survey on machine learning-based detection and classification technology of malware
- Syntia: Synthesizing the semantics of obfuscated code
- Toward generic unpacking techniques for malware analysis with quantification of code revelation
- Towards static analysis of virtualization-obfuscated binaries
- Tutorial: An overview of malware detection and evasion techniques
- Unconditional self-modifying code elimination with dynamic compiler optimizations
- Watermarking, tamper-proofing, and obfuscation - Tools for software protection
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Original entry point detection based on graph similarity
- Packer classification based on association rule mining
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Sequential opcode embedding-based malware detection method
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing the impact of packing on machine learning-based malware detection and classification systems
- Automatic generation of adversarial examples for interpreting malware classifiers
- Bypassing anti-analysis of commercial protector methods using DBI tools
- Chosen-instruction attack against commercial code virtualization obfuscators
- Collective classification for packed executable identification
- A comprehensive solution for obfuscation detection and removal based on comparative analysis of deobfuscation tools
- Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis
- Detecting packed executables based on raw binary data
- Detecting traditional packers, decisively
- Detection of packed executables using support vector machines
- Detection of packed malware
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic unpacking of self-modifying, aggressive, packed binary programs
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Malware makeover: Breaking ML-based static analysis by modifying executable bytes
- Malware obfuscation through evolutionary packers
- Malwise - An effective and efficient classification system for packed and polymorphic malware
- MetaAware: Identifying metamorphic malware
- MSG: Missing-sequence generator for metamorphic malware detection
- MutantX-S: Scalable malware clustering based on static features
- On evaluating adversarial robustness
- On the feasibility of malware unpacking via hardware-assisted loop profiling
- Opcodes as predictor for malware
- PE-Probe: Leveraging packer detection and structural information to detect malicious portable executables
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Packer identification using byte plot and Markov plot
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- BitBlaze: A new approach to computer security via binary analysis
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Static analysis method on portable executable files for REMNUX based malware identification
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- The application research of virtual machine in packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Boosting scalability in anomaly-based packed executable filtering
- A close look at a daily dataset of malware samples
- Denial-of-service attacks on host-based generic unpackers
- Detecting packed PE files: Executable file analysis for the Windows operating system
- Detecting traditional packers, decisively
- Efficient and automatic instrumentation for packed binaries
- Encoded executable file detection technique via executable file header analysis
- Enhancing machine learning based malware detection model by reinforcement learning
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Fast and robust fixed-point algorithms for independent component analysis
- A fine-grained classification approach for the packed malicious code
- Generic unpacker of executable files
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- RePEF — A system for restoring packed executable file for malware analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Detection of metamorphic malware packers using multilayered LSTM networks
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Efficient automatic original entry point detection
- An efficient block-discriminant identification of packed malware
- Efficient SVM based packer identification with binary diffing measures
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Exploring adversarial examples in malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Generic unpacking techniques
- Hashing-based encryption and anti-debugger support for packing multiple files into single executable
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Malware detection through opcode sequence analysis using machine learning
- MSG: Missing-sequence generator for metamorphic malware detection
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Preprocessing of binary executable files towards retargetable decompilation
- RAMBO: Run-Time packer analysis with multiple branch observation
- Renovo: A hidden code extractor for packed executables
- Sequential opcode embedding-based malware detection method
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Packed PE file detection for malware forensics
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- DexHunter: Toward extracting hidden code from packed Android applications
- Entropy analysis to classify unknown packing algorithms for malware detection
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Efficient and automatic instrumentation for packed binaries
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- MaliCage: A packed malware family classification framework based on DNN and GAN
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer classification based on association rule mining
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- An application of machine learning to analysis of packed mac malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- A fine-grained classification approach for the packed malicious code
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Pattern recognition techniques for the classification of malware packers
- Packer identification using hidden Markov model
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Research of software information hiding algorithm based on packing technology
- RAMBO: Run-Time packer analysis with multiple branch observation
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- PE-Miner: Mining structural information to detect malicious executables in realtime
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Pattern recognition techniques for the classification of malware packers
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- BitBlaze: A new approach to computer security via binary analysis
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Certified robustness of static deep learning-based malware detectors against patch and append attacks
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Mal-xtract: Hidden code extraction using memory analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- On the (Im)possibility of obfuscating programs
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- PEzoNG: Advanced packer for automated evasion on Windows
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- A fine-grained classification approach for the packed malicious code
- Entropy analysis to classify unknown packing algorithms for malware detection
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Mal-xtract: Hidden code extraction using memory analysis
- A machine-learning-based framework for supporting malware detection and analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- PEAL - Packed executable analysis
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- Semi-supervised learning for unknown malware detection
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Packer identification using byte plot and Markov plot
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Experimental toolkit for manipulating executable packing
- BitBlaze: A new approach to computer security via binary analysis
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Detecting traditional packers, decisively
- Denial-of-service attacks on host-based generic unpackers
- DexHunter: Toward extracting hidden code from packed Android applications
- Entropy analysis to classify unknown packing algorithms for malware detection
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Feature selection for packer classification based on association rule mining
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- DexHunter: Toward extracting hidden code from packed Android applications
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Automated static analysis of virtual-machine packers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- BitBlaze: A new approach to computer security via binary analysis
- Control flow-based opcode behavior analysis for malware detection
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Detecting unknown malicious code by applying classification techniques on opcode patterns
- Generic unpacking method based on detecting original entry point
- An efficient algorithm to extract control flow-based features for ioT malware detection
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Entropy analysis to classify unknown packing algorithms for malware detection
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- A study of the packer problem and its solutions
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Control flow-based opcode behavior analysis for malware detection
- Design and development of a new scanning core engine for malware detection
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Efficient and automatic instrumentation for packed binaries
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- On the (Im)possibility of obfuscating programs
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Packer identification using byte plot and Markov plot
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Adversarial attacks against windows PE malware detection: A survey of the state-of-the-art
- Analysis of machine learning approaches to packing detection
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Detecting traditional packers, decisively
- Packer identification using byte plot and Markov plot
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- PEzoNG: Advanced packer for automated evasion on Windows
- A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- Detecting unknown malicious code by applying classification techniques on opcode patterns
- DexHunter: Toward extracting hidden code from packed Android applications
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Original entry point detection based on graph similarity
- Absent extreme learning machine algorithm with application to packed executable identification
- Adversarial EXEmples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
- ByteWise: A case study in neural network obfuscation identification
- Complexity-based packed executable classification with high accuracy
- DroidPDF: The obfuscation resilient packer detection framework for Android Apps
- Dynamic classification of packing algorithms for inspecting executables using entropy analysis
- A dynamic heuristic method for detecting packed malware using naive bayes
- Packing detection and classification relying on machine learning to stop malware propagation
- Pandora's Bochs: Automatic unpacking of malware
- PE file features in detection of packed executables
- PE file header analysis-based packed PE file detection technique (PHAD)
- Research and implementation of compression shell unpacking technology for PE file
- Research of software information hiding algorithm based on packing technology
- Robust static analysis of portable executable malware
- Semi-supervised learning for unknown malware detection
- Source-free binary mutation for offense and defense
- Static features exploration for executable packing with unsupervised learning
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- A token strengthened encryption packer to prevent reverse engineering PE files
- Unpacking malware in the real world: A step-by step guide
- UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
- Using entropy analysis to find encrypted and packed malware
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Building a malware mutation tool
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Analysis of machine learning approaches to packing detection
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- DexHunter: Toward extracting hidden code from packed Android applications
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- A consistently-executing graph-based approach for malware packer identification
- Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
- Disabling anti-debugging techniques for unpacking system in user-level debugger
- G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families
- A heuristic approach for detection of obfuscated malware
- An improved method for packed malware detection using PE header and section table information
- A learning model to detect maliciousness of portable executable using integrated feature set
- Maitland: Analysis of packed and encrypted malware via paravirtualization extensions
- Malware analysis using multiple API sequence mining control flow graph
- Malware family classification method based on static feature extraction
- Malware images: Visualization and automatic classification
- RAMBO: Run-Time packer analysis with multiple branch observation
- Singular value decomposition and metamorphic detection
- SMASH: A malware detection method based on multi-feature ensemble learning
- A study of the packer problem and its solutions
- Unpacking malware in the real world: A step-by step guide
- Unsupervised clustering machine learning on packed executable
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Denial-of-service attacks on host-based generic unpackers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- BitBlaze: A new approach to computer security via binary analysis
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- BitBlaze: A new approach to computer security via binary analysis
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Entropy analysis to classify unknown packing algorithms for malware detection
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- A fine-grained classification approach for the packed malicious code
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- BitBlaze: A new approach to computer security via binary analysis
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Revealing packed malware
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Ether: Malware analysis via hardware virtualization extensions
- Eureka: A framework for enabling static malware analysis
- Experimental comparison of machine learning models in malware packing detection
- Fileprints: Identifying file types by n-gram analysis
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Evading packing detection: Breaking heuristic-based static detectors
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Adaptive unpacking of Android Apps
- Advanced feature engineering for static detection of executable packing
- A comparative analysis of classifiers in the recognition of packed executables
- A comparative analysis of software protection schemes
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- SATURN - Software deobfuscation framework based on LLVM
- Sensitive system calls based packed malware variants detection using principal component initialized multilayers neural networks
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
- Adversarially robust assembly language model for packed executables detection
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- Automatic analysis of malware behavior using machine learning
- Benchmark for filter methods for feature selection in high-dimensional classification data
- Beyond the sandbox: Leveraging symbolic execution for evasive malware classification
- BitBlaze: A new approach to computer security via binary analysis
- BODMAS: An open dataset for learning based temporal analysis of PE malware
- Building high-quality datasets of packed executables - Enhancing static detection models via curated packed binary datasets
- Bypassing heaven’s gate technique using black-box testing
- BYTEWEIGHT: Learning to recognize functions in binary code
- Challenging anti-virus through evolutionary malware obfuscation
- Classification of malware by using structural entropy on convolutional neural networks
- Denial-of-service attacks on host-based generic unpackers
- Deobfuscation of packed and virtualization-obfuscation protected binaries
- Deobfuscation of virtualization-obfuscated code through symbolic execution and compilation optimization
- Deobfuscation of virtualization-obfuscated software: A semantics-based approach
- Efficient malware packer identification using support vector machines with spectrum kernel
- ELF-Miner: Using structural knowledge and data mining methods to detect new (Linux) malicious executables
- EMBER: An open dataset for training static PE malware machine learning models
- An empirical evaluation of an unpacking method implemented with dynamic binary instrumentation
- Entropy analysis to classify unknown packing algorithms for malware detection
- ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
- ESCAPE: Entropy score analysis of packed executable
- A fast flowgraph based classification system for packed and polymorphic malware on the endhost
- Feature selection for malware detection based on reinforcement learning
- Feature set reduction for the detection of packed executables
- File packing from the malware perspective: Techniques, analysis approaches, and directions for enhancements
- A fine-grained classification approach for the packed malicious code
- A generic approach to automatic deobfuscation of executable code
- Generic packing detection using several complexity analysis for accurate malware detection
- Generic unpacking method based on detecting original entry point
- Identifying malware packers through multilayer feature engineering in static analysis
- An implementation of a generic unpacking method on Bochs Emulator
- Improving malware detection using multi-view ensemble learning
- Incremental clustering of malware packers using features based on transformed CFG
- Information theoretic method for classification of packed and encoded files
- Metadata recovery from obfuscated programs using machine learning
- The new signature generation method based on an unpacking algorithm and procedure for a packer detection
- Novel feature extraction, selection and fusion for effective malware family classification
- Obfuscation-resilient executable payload extraction from packed malware
- Obfuscation: The hidden malware
- Obfuscation: Where are we in anti-DSE protections? (a first attempt)
- Obfuscator-LLVM: Software protection for the masses
- OmniUnpack: Fast, generic, and safe unpacking of malware
- Packer classifier based on PE header information
- Packer detection for multi-layer executables using entropy analysis
- Replacement attacks against VM-protected applications
- Research of software information hiding algorithm based on packing technology
- Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
- Secure and advanced unpacking using computer emulation
- Semi-supervised learning for unknown malware detection
- Software protection through anti-debugging
- A static, packer-agnostic filter to detect similar malware samples
- A survey on adversarial attacks for malware analysis
- A survey on automated dynamic malware-analysis techniques and tools
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- A systematical and longitudinal study of evasive behaviors in windows malware
- Understanding Linux malware
- Wavelet decomposition of software entropy reveals symptoms of malicious code
- Xunpack: Cross-Architecture unpacking for Linux IoT malware
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Entropy analysis to classify unknown packing algorithms for malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- All-in-one framework for detection, unpacking, and verification for malware analysis
- Application of string kernel based support vector machine for malware packer identification
- Auditing static machine learning anti-Malware tools against metamorphic attacks
- Certified robustness of static deep learning-based malware detectors against patch and append attacks
- Classifying packed programs as malicious software detected
- Code obfuscation techniques for software protection
- A control flow graph-based signature for packer identification
- Countering entropy measure attacks on packed software detection
- Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
- Deceiving end-to-end deep learning malware detectors using adversarial examples
- Deceiving portable executable malware classifiers into targeted misclassification with practical adversarial examples
- Detecting packed executables using steganalysis
- Entropy-driven visualization in gview: Unveiling the unknown in binary file formats
- An experimental study on identifying obfuscation techniques in packer
- A framework for metamorphic malware analysis and real-time detection
- A heuristics-based static analysis approach for detecting packed PE binaries
- Longitudinal study of the prevalence of malware evasive techniques
- The MALICIA dataset: Identification and analysis of drive-by download operations
- MLxPack: Investigating the effects of packers on ML-based malware detection systems using static and dynamic traits
- On the (im)possibility of obfuscating programs (2)
- Packer identification based on metadata signature
- PEzoNG: Advanced packer for automated evasion on Windows
- PolyPack: An automated online packing service for optimal antivirus evasion
- RePEconstruct: Reconstructing binaries with self-modifying code and import address table destruction
- SoK: (state of) the art of war: Offensive techniques in binary analysis
- SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers
- Structural entropy and metamorphic malware
- Technical report on the cleverhans v2.1.0 adversarial examples library
- Things you may not know about Android (Un) packers: A systematic study based on whole-system emulation.
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- An accurate packer identification method using support vector machine
- Detecting packed executable file: Supervised or anomaly detection method?
- Evading anti-malware engines with deep reinforcement learning
- A fast randomness test that preserves local detail
- Functionality-preserving black-box optimization of adversarial windows malware
- Malware obfuscation techniques: A brief survey
- McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
- Memory behavior-based automatic malware unpacking in stealth debugging environment
- Modern Linux malware exposed
- Packed code detection using shannon entropy and homomorphic encrypted executables
- Packed malware detection using entropy related analysis: A survey
- Packed malware variants detection using deep belief networks
- Packer identification method based on byte sequences
- Packer identification method for multi-layer executables with k-Nearest neighbor of entropies
- Packer identification using byte plot and Markov plot
- Research and implementation of packing technology for PE files
- Reverse engineering self-modifying code: Unpacker extraction
- Runtime packers testing experiences
- SCORE: Source code optimization & reconstruction
- SE-PAC: A self-evolving packer classifier against rapid packers evolution
- A survey on adversarial attacks for malware analysis
- Symbolic execution of obfuscated code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- A static, packer-agnostic filter to detect similar malware samples
- Adversarial malware binaries: Evading deep learning for malware detection in executables
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering
- Detecting obfuscated malware using reduced opcode set and optimised runtime trace
- Detecting packed executables based on raw binary data
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- An efficient algorithm to extract control flow-based features for ioT malware detection
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- Learning to evade static PE machine learning malware models via reinforcement learning
- Limits of static analysis for malware detection
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- Adversarial learning on static detection techniques for executable packing
- Adversarial tool for breaking static detection of executable packing
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- An application of machine learning to analysis of packed mac malware
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Building a malware mutation tool
- Building a smart and automated tool for packed malware detections using machine learning
- Building high-quality datasets of packed executables - Enhancing static detection models via curated packed binary datasets
- Denial-of-service attacks on host-based generic unpackers
- Design and implementation of a modular executable packer - Experimenting with packing techniques and static detection
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Dynamic binary instrumentation for deobfuscation and unpacking
- Effective, efficient, and robust packing detection and classification
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Experimental toolkit for studying executable packing - Analysis of the state-of-the-art packing detection techniques
- Feature selection for packer classification based on association rule mining
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- MaliCage: A packed malware family classification framework based on DNN and GAN
- Malware detection through opcode sequence analysis using machine learning
- Metamorphic malware detection based on support vector machine classification of malware sub-signatures
- On the (Im)possibility of obfuscating programs
- On the adoption of anomaly detection for packed executable filtering
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Preprocessing of binary executable files towards retargetable decompilation
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Source-free binary mutation for offense and defense
- Static features exploration for executable packing with unsupervised learning
- Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Automatic static unpacking of malware binaries
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking virtualization obfuscators
- VMAttack: Deobfuscating virtualization-based packed binaries
- VMHunt: A verifiable approach to partially-virtualized binary code simplification
- VMRe: A reverse framework of virtual machine protection packed binaries
- When malware is packin' heat; limits of machine learning classifiers based on static analysis features
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generating adversarial malware examples for black-box attacks based on GAN
- Generic unpacking method based on detecting original entry point
- Generic unpacking using entropy analysis
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Potent and stealthy control flow obfuscation by stack based self-modifying code
- Practical attacks on machine learning: A case study on adversarial windows malware
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for packed executable detection
- Semi-supervised learning for unknown malware detection
- SPADE: Signature based packer detection
- A static, packer-agnostic filter to detect similar malware samples
- Structural feature based anomaly detection for packed executable identification
- The study of evasion of packed PE from static detection
- Survey on malware evasion techniques: State of the art and challenges
- A survey on run-time packers and mitigation techniques
- Thwarting real-time dynamic unpacking
- Towards paving the way for large-scale Windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost
- Transcending transcend: Revisiting malware classification in the presence of concept drift
- Two techniques for detecting packed portable executable files
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey on run-time packers and mitigation techniques
- Symbolic deobfuscation: From virtualized code back to the original
- Unpacking malware in the real world: A step-by step guide
- VABox: A virtualization-based analysis framework of virtualization-obfuscated packed executables
- Design and implementation of a modular executable packer - Experimenting with packing techniques and static detection
- Detecting obfuscated viruses using cosine similarity analysis
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Efficient automatic original entry point detection
- EMBER2024 - A benchmark dataset for holistic evaluation of malware classifiers
- Enhanced metamorphic techniques-A case study against havex malware
- An entropy-based distance measure for analyzing and detecting metamorphic malware
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- GUARD: Generic API de-obfuscation and obfuscated malware unpacking with sIAT
- Hashing-based encryption and anti-debugger support for packing multiple files into single executable
- Highlighting the impact of packed executable alterations with unsupervised learning
- Hunting for metamorphic engines
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- Measuring and defeating anti-instrumentation-equipped malware
- Metamorphic malware detection based on support vector machine classification of malware sub-signatures
- Metamorphic malware identification using engine-specific patterns based on co-opcode graphs
- Mimicking anti-viruses with machine learning and entropy profiles - 05-21)
- A novel framework for image-based malware detection with a deep neural network
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- Performance evaluation of filter-based feature selection techniques in classifying portable executable files
- Program obfuscation by strong cryptography
- Structural analysis of binary executable headers for malware detection optimization
- The arms race: Adversarial search defeats entropy used to detect malware
- Automated static analysis of virtual-machine packers
- BareUnpack: Generic unpacking on the bare-metal operating system
- Binary-code obfuscations in prevalent packer tools
- BinStat tool for recognition of packed executables
- Birds of a feature: Intrafamily clustering for version identification of packed malware
- Classification of packed executables for accurate computer virus detection
- Classifying packed malware represented as control flow graphs using deep graph convolutional neural network
- A compact multi-step framework for packing identification in portable executable files for malware analysis
- A comparative assessment of malware classification using binary texture analysis and dynamic analysis
- Comparing malware samples for unpacking: A feasibility study
- Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)
- Instructions-based detection of sophisticated obfuscation and packing
- Intriguing properties of adversarial ML attacks in the problem space
- Intriguing properties of neural networks
- MAB-Malware: A reinforcement learning framework for attacking static malware classifiers
- Mal-EVE: Static detection model for evasive malware
- Mal-flux: Rendering hidden code of packed binary executable
- Malware analysis using visualized images and entropy graphs
- On deceiving malware classification with section injection
- Opcode sequences as representation of executables for data-mining-based unknown malware detection
- An original entry point detection method with candidate-sorting for more effective generic unpacking
- Packer-complexity analysis in PANDA
- PackGenome: Automatically generating robust YARA rules for accurate malware packer detection
- PackHero: A scalable graph-based approach for efficient packer identification
- Pitfalls in machine learning for computer security
- PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
- Prevalence and impact of low-entropy packing schemes in the malware ecosystem
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- Unknown malcode detection using OPCODE representation
- A unpacking and reconstruction system-agunpacker
- Unpacking framework for packed malicious executables
- Unpacking techniques and tools in malware analysis
- WYSINWYX: What you see is not what you execute
- x64Unpack: Hybrid emulation unpacker for 64-bit Windows Environments and detailed analysis results on VMProtect 3.4
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- Assessing static and dynamic features for packing detection
- BitBlaze: A new approach to computer security via binary analysis
- Denial-of-service attacks on host-based generic unpackers
- Detecting traditional packers, decisively
- DexHunter: Toward extracting hidden code from packed Android applications
- Efficient and automatic instrumentation for packed binaries
- Evading packing detection: Breaking heuristic-based static detectors
- Experimental toolkit for manipulating executable packing
- A fine-grained classification approach for the packed malicious code
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic unpacking method based on detecting original entry point
- Highlighting the impact of packed executable alterations with unsupervised learning
- A machine-learning-based framework for supporting malware detection and analysis
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- On the (Im)possibility of obfuscating programs
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Original entry point detection based on graph similarity
- Packer identification using hidden Markov model
- Pattern recognition techniques for the classification of malware packers
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PEAL - Packed executable analysis
- RAMBO: Run-Time packer analysis with multiple branch observation
- Research of software information hiding algorithm based on packing technology
- Semi-supervised learning for unknown malware detection
- Adversarial attacks against windows PE malware detection: A survey of the state-of-the-art
- Assessing the impact of packing on machine learning-based malware detection and classification systems
- Computational-intelligence techniques for malware generation
- Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
-
Documentation
- Anti debugging protection techniques with examples
- a.out (FreeBSD manual pages)
- About anti-debug tricks
- Anti-unpacker tricks - Part 14 (and previous parts)
- Defacto2
- Dynamic binary analysis and obfuscated codes
- elf (FreeBSD manual pages)
- Executable file formats
- FatELF: Universal binaries for Linux (HALTED)
- Implementing your own generic unpacker
- MITRE ATT&CK | T1027.002 | obfuscated files or information: Software packing
- Parsing mach-O files
- TitanMist: Your first step to reversing nirvana
- Writing a packer
- The matthews correlation coefficient (MCC) should replace the ROC AUC as the standard metric for assessing binary classification
- MZ disk operating system (DOS)
- OllyDbg OEP finder scripts
- Packers
- Pattern recognition and machine learning (Information science and statistics)
- PinDemonium: A DBI-based generic unpacker for Windows executables
- Portable executable (PE)
- Win32 portable executable packing uncovered
- Writing a PE packer
- One packer to rule them all: Empirical identification, comparison and circumvention of current antivirus detection techniques
- Writing a simple PE packer in detail
- Packing-box: Playing with executable packing
- ProtectMyTooling - Don't detect tools, detect techniques
- Unpacking, reversing, patching
- Mach-O - A look at apple executable files
- On the worst-case complexity of timsort
- ProtectMyTooling - Don't detect tools, detect techniques
- Machine learning
- The matthews correlation coefficient (MCC) should replace the ROC AUC as the standard metric for assessing binary classification
- NotPacked++: Evading static packing detection
- The art of memory forensics: Detecting malware and threats in Windows, Linux, and mac memory
- Cluster analysis
- Comparison of executable file formats
- Executable and linking format (ELF) specification
- NotPacked++: Evading static packing detection
- TitanMist: Your first step to reversing nirvana
- Cloak and dagger: Unpacking hidden malware attacks
- COM binary format
- PE format - Win32 apps
- Virtual machine obfuscation
- We can still crack you! General unpacking method for Android Packer (NO ROOT)
- When malware is packing heat
- x86 disassembly/Windows executable files
- Unpacking, reversing, patching
- Implementing your own generic unpacker
- MITRE ATT&CK | T1406.002 | obfuscated files or information: Software packing - Mobile
- Unpacking the potential of "Packing box"
- Unpacking, reversing, patching
- A.out binary format
- Android packers: Separating from the pack
- Packing-box: Improving detection of executable packing
- A survey of dimensionality reduction techniques
- Tuts 4 you - UnPackMe (.NET)
- Tuts 4 you | unpackme
- NotPacked++: Evading static packing detection
- Packing-box: Improving detection of executable packing
- Awesome LLVM security
- Practical malware analysis: The hands-on guide to dissecting malicious software
- A complexity measure
- Cyclomatic complexity density and software maintenance productivity
- Defacto2
- Mach-O file format reference
- Making our own executable packer
- The art of memory forensics: Detecting malware and threats in Windows, Linux, and mac memory
- The art of unpacking
- Cloak and dagger: Unpacking hidden malware attacks
- Clustering algorithms
- Evading machine learning malware detection
- Qualitative and quantitative evaluation of software packers
- Reverse engineering malware: Binary obfuscation and protection
- Runtime packers testing experiences
- The "Ultimate" anti-debugging reference
- Unpacking binary 101
- API deobfuscator: Resolving obfuscated API functions in modern packers
- Do we need hundreds of classifiers to solve real world classification problems?
- Entropy and the distinctive signs of packer PE files
- Executable and linkable format (ELF)
- Explained: Packer, crypter, and protector
- Feature selection: A data perspective
- Hyperion: Implementation of a PE-Crypter
- Mach-O internals
- Microsoft portable executable and common object file format specification
- Packer detection tool evaluation
- Runtime packers: The hidden problem?
- Anti-unpacker tricks
- Standards and policies on packer use
- One packer to rule them all: Empirical identification, comparison and circumvention of current antivirus detection techniques
- a.out (FreeBSD manual pages)
- About anti-debug tricks
- Anti-unpacker tricks - Part 14 (and previous parts)
- Cluster analysis
- Dynamic binary analysis and obfuscated codes
- elf (FreeBSD manual pages)
- Executable file formats
- FatELF: Universal binaries for Linux (HALTED)
- How to use t-SNE effectively
- Implementing your own generic unpacker
- Mach-O - A look at apple executable files
- Machine learning
- MITRE ATT&CK | T1027.002 | obfuscated files or information: Software packing - Enterprise
- MITRE ATT&CK | T1406.002 | obfuscated files or information: Software packing - Mobile
- Packer analysis report debugging and unpacking the NsPack 3.4 and 3.7 packer
- Parsing mach-O files
- WaveAtlas: Surfing through the landscape of current malware packers
- Writing a packer
- Writing a simple PE packer in detail
- YARA - The pattern matching swiss knife for malware researchers.
- Gunpack: Un outil générique d'unpacking de malwares
- Armouring the ELF: Binary encryption on the UNIX platform
- Learn symbolic execution and angr
- LIEF: Library to instrument executable formats
- The malware analyst's guide to aPLib decompression
- Packers/Protectors for Linux
- Packing-box: Playing with executable packing
- TitanMist: Your first step to reversing nirvana
- Common object file format (COFF)
- Dealing with virtualization packers
- Packing-box: Breaking detectors & visualizing packing
-
-
:package: Packers
-
Between 2000 and 2010
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- TTProtect - Professional protection tool designed for software developers to protect their PE applications against illegal modification or decompilation.
- 20to4 - Executable compressor that is able to stuff about 20k of finest code and data into less than 4k.
- AverCryptor - Small and very handy utility designed to encrypt notes in which you can store any private information - it helps to hide your infection from antiviruses.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- CryptExec - Next-generation runtime binary encryption using on-demand function extraction.
- EXE Guarder - Licensing tool for PE files allowing to compress and specify a password notice.
- EXE Wrapper - Protects any EXE file with a password from non-authorized execution.
- FSG - *Fast Small Good*, perfect compressor for small exes, eg.
- Kkrunchy - Kkrunchy is a small exe packer primarily meant for 64k intros.
- NSPack - 32/64-bits exe, dll, ocx, scr Windows program compressor.
- PECompact - Windows executable compressor featuring third-party plug-ins offering protection against reverse engineering.
- RLPack - Compresses your executables and dynamic link libraries in a way that keeps them small and has no effect on compressed file functionality.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- XComp - PE32 image file packer and rebuilder.
- Yoda Crypter - Supports polymorphic encryption, softice detection, anti-debug API's, anti-dumping, etc, encrypts the Import Table and erases PE Header.
- Yoda Protector - Free, open source, Windows 32-bit software protector.
- BurnEye - ELF encryption program, x86-linux binary.
- cryptelf - Modifies binary by appending code to handle runtime decryption, changing the program EP and changing the .note segment to LOAD ; encrypts the .text section by XORing its bytes with a key.
- Shiva - Tool to encrypt ELF executables under Linux.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- Laturi - Linker and compressor intended to be used for macOS 1k, 4k and perhaps 64K intros.
- RUCC - ROSE Ultra COM Compressor ; COM and EXE compression utility based on 624.
- UPX-Scrambler - Scrambler for files packed with UPX (up to 1.06) so that they cannot be unpacked with the '-d' option.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- Laturi - Linker and compressor intended to be used for macOS 1k, 4k and perhaps 64K intros.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- TTProtect - Professional protection tool designed for software developers to protect their PE applications against illegal modification or decompilation.
- x86.Virtualizer - x86 Virtualizer.
- cryptelf - Modifies binary by appending code to handle runtime decryption, changing the program EP and changing the .note segment to LOAD ; encrypts the .text section by XORing its bytes with a key.
- sePACKER - Simple Executable Packer is compressing executables' code section inorder to decrease size of binary files.
- Shiva - Tool to encrypt ELF executables under Linux.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- ByteBoozer - Commodore 64 executable packer.
- Sentinel HASP Envelope - Wrapping application that protects the target application with a secure shield, providing a means to counteract reverse engineering and other anti-debugging measures.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- AT4RE Protector - Very simple PE files protector programmed in ASM.
- EXE Guarder - Licensing tool for PE files allowing to compress and specify a password notice.
- Exe32Pack - Compresses Win32 EXEs, DLLs, etc and dynamically expands them upon execution.
- EXECryptor - Protects EXE programs from reverse engineering, analysis, modifications and cracking.
- ExeFog - Simple Win32 PE files packer.
- eXPressor - Used as a compressor this tool can compress EXE files to half their normal size.
- GHF Protector - Executable packer / protector based on open source engines Morphine and AHPack.
- mPack - Mario PACKersimple Win32 PE Executable compressor.
- NTPacker - PE file packer relying on aPlib for compression and/or XOR for encryption.
- UPack - Compresses Windows PE file.
- x86.Virtualizer - x86 Virtualizer.
- XComp - PE32 image file packer and rebuilder.
- BurnEye - ELF encryption program, x86-linux binary.
- 20to4 - Executable compressor that is able to stuff about 20k of finest code and data into less than 4k.
- AverCryptor - Small and very handy utility designed to encrypt notes in which you can store any private information - it helps to hide your infection from antiviruses.
- BurnEye - ELF encryption program, x86-linux binary.
- cryptelf - Modifies binary by appending code to handle runtime decryption, changing the program EP and changing the .note segment to LOAD ; encrypts the .text section by XORing its bytes with a key.
- CryptExec - Next-generation runtime binary encryption using on-demand function extraction.
- EXE Wrapper - Protects any EXE file with a password from non-authorized execution.
- FSG - *Fast Small Good*, perfect compressor for small exes, eg.
- HackStop - EXE and COM programs encrypter and protector.
- Kkrunchy - Small exe packer primarily meant for 64k intros.
- Laturi - Linker and compressor intended to be used for macOS 1k, 4k and perhaps 64K intros.
- NSPack - 32/64-bits exe, dll, ocx, scr Windows program compressor.
- RLPack - Compresses your executables and dynamic link libraries in a way that keeps them small and has no effect on compressed file functionality.
- RSCC - ROSE Super COM Crypt ; polymorph cryptor for files greater than 300-400B and smaller than 60kB.
- Shiva - Tool to encrypt ELF executables under Linux.
- Yoda Crypter - Supports polymorphic encryption, softice detection, anti-debug API's, anti-dumping, etc, encrypts the Import Table and erases PE Header.
- Yoda Protector - Free, open source, Windows 32-bit software protector.
- RDMC - DMC algorithm based packer.
- tElock - Practical tool that intends to help developers who want to protect their work and reduce the size of the executable files.
- TTProtect - Professional protection tool designed for software developers to protect their PE applications against illegal modification or decompilation.
- PECompact - Windows executable compressor featuring third-party plug-ins offering protection against reverse engineering.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- ACProtect - Application that allows to protect Windows executable files against piracy, using RSA to create and verify the registration keys and unlock code.
- AHPack - PE and PE+ file packer.
- Application Protector - Tool for protecting Windows applications.
- BurnEye - Burneye ELF encryption program, x86-linux binary.
- Shiva - Shiva is a tool to encrypt ELF executables under Linux.
- WinUpack - Graphical interface for Upack, a command-line program used to create self-extracting archives from Windows PE files.
- Shiva - Tool to encrypt ELF executables under Linux.
- BurnEye - ELF encryption program, x86-linux binary.
-
After 2010
- Alienyze - Advanced software protection and security for Windows 32-bit executables.
- Andromeda - Custom packer used in malware campaigns using RunPE techniques for evading AV mitigation methods.
- APKProtect - APK encryption and shell protection supporting Java and C++.
- Armadillo - Incorporates both a license manager and wrapper system for protecting PE files.
- ASPack - Advanced solution created to provide Win32 EXE file packing and to protect them against non-professional reverse engineering.
- ASProtect 32 - Multifunctional EXE packing tool designed for software developers to protect 32-bit applications with in-built application copy protection system.
- ASProtect 64 - Tool for protecting 64-bit applications and .NET applications for Windows against unauthorized use, industrial and home copying, professional hacking and analysis of software products distributed over the Internet and on any physical media.
- BIN-crypter - EXE protection software against crackers and decompilers.
- BoxedApp Packer
- DexGuard - Android app obfuscation & security protocols for mobile app protection.
- ElecKey - Suite of software and tools that offer a complete solution for software protection, copy protection, and license management.
- Enigma Protector - Professional system for executable files licensing and protection.
- EXE Stealth - Anti-cracking protection and licensing tool for PE files featuring compression and encryption polymorphic technology.
- GzExe - Utility that allows to compress executables as a shell script.
- LIAPP - Easiest and most powerful mobile app security solution.
- LM-X License Manager - LM-X License Manager lets you protect your products against piracy by enforcing various levels of security, save time, and reduce business risks.
- NPack - Can compress 32bits and 64bits exe, dll, ocx, scr Windows program.
- Obsidium - Feature-rich professional software protection and licensing system designed as a cost effective and easy to implement, yet reliable and non-invasive way to protect your 32- and 64-bit Windows software applications and games from reverse engineering.
- PELock - Software protection system for Windows executable files ; protects your applications from tampering and reverse engineering, and provides extensive support for software license key management, including support for time trial periods.
- RapidEXE - Simple and efficient way to convert a PHP/Python script to a standalone executable.
- Smart Packer - Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Squishy - Modern packer developed for 64kb demoscene productions, targets 32bit and 64bit executables.
- ZProtect - Renames metadata entities and supports advanced obfuscation methods that harden protection scheme and foil reverse engineering altogether.
- Amber - Position-independent(reflective) PE loader that enables in-memory execution of native PE files(EXE, DLL, SYS).
- Themida - From Renovo paper: Themida converts the original x86 instructions into virtual instructions in its own randomized instruction set, and then interpret these virtual instructions at run-time.
- VMProtect - Protects code by executing it on a virtual machine with non-standard architecture that makes it extremely difficult to analyze and crack the software.
- Ward - Simple implementation of an ELF packer that creates stealthy droppers for loading malicious ELFs in-memory.
- Woody Wood Packer - ELF packer - encrypt and inject self-decryption code into executable ELF binary target.
- XyrisPack
- ELFuck - ELF packer for i386 original version from sk2 by sd.
- Pakkero - Binary packer written in Go made for fun and educational purpose.
- PE-Packer - Simple packer for Windows 32-bits PE files.
- PE-Toy - A PE file packer.
- ASM Guard - Packer utility for compressing and complicating reversing compiled native code (native files), protecting resources, adding DRM, and packing into an optimized loader.
- EXE Bundle - Bundles application files into a single PE32 file.
- BoxedApp Packer
- hXOR-Packer - PE packer with Huffman compression and XOR encryption.
- SimpleDPack - A very simple windows EXE packing tool for learning or investigating PE structure.
- Smart Packer - Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Code Virtualizer - Powerful code obfuscation system for Windows, Linux and macOS applications that helps developers to protect their sensitive code areas against Reverse Engineering with very strong obfuscation code, based on code virtualization.
- Eronona-Packer - This is a packer for exe under win32.
- NetCrypt - A proof-of-concept packer for .NET executables, designed to provide a starting point to explain the basic principles of runtime packing.
- oplzkwp - Library for ELF obfuscation ; it uses PRESENT and blake244 to encrypt your payload on the fly.
- Pakr - In-memory packer for macOS Mach-O bundles.
- PePacker - Simple PE Packer Which Encrypts .text Section I release a simple PE file packer which encrypts the .text section and adds a decryption stub to the end of the last section.
- pocrypt - Naive Proof of Concept Crypter for GNU/Linux ELF64.
- ps2-packer - Create packed ELF files to run on the PS2.
- sherlocked
- theArk - Windows x86 PE Packer In C++.
- UPX - Ultimate Packer for eXecutables.
- ConfuserEx - An open-source, free protector for .NET applications.
- DarkCrypt - Simply and powerful plugin for Total Commander used for file encryption using 100 algorithms and 5 modes.
- DexProtector - Multi-layered RASP solution that secures your Android and iOS apps against static and dynamic analysis, illegal use and tampering.
- DotNetZ - Straightforward and lightweight, command-line piece of software written in C that allows you to compress and pack Microsoft .NET Framework executable files.
- ELF Packer - Encrypts 64-bit elf files that decrypt at runtime.
- ELFCrypt - Simple ELF crypter using RC4 encryption.
- Ezuri - A Simple Linux ELF Runtime Crypter.
- Hyperion
- LM-X License Manager - Lets you protect your products against piracy by enforcing various levels of security, save time, and reduce business risks.
- m0dern_p4cker - Just a modern packer for elf binaries ( works on Linux executables only ).
- MidgetPack - ELF binary packer, such as burneye, upx or other tools.
- Origami - Packer compressing .net assemblies, (ab)using the PE format for data storage.
- PELock - Software protection system for Windows executable files ; protects your applications from tampering and reverse engineering, and provides extensive support for software license key management, including support for time trial periods.
- Smart Packer - Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Astral-PE - Low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64).
- AxProtector - Encrypts the complete software you aim to protect, and shields it with a security shell, AxEngine, best-of-breed anti-debugging and anti-disassembly methods are then injected into your software.
- Backpack
- Bero - BEP (Bero EXE Packer) for 32-bit windows executables.
- BIN-crypter - EXE protection software against crackers and decompilers.
- ELF-Encrypter - Collection of programs to encrypt ELF binaries using various algorithms.
- ELF-Packer - Simple Polymorphic x86_64 Runtime Code Segment Cryptor.
- ELFkickers - A collection of programs that access and manipulate ELF files.
- Enigma Virtual Box - Application virtualization system for Windows.
- EXE Bundle - Bundles application files into a single PE32 file.
- .netshrink - Executable compressor for your Windows or Linux .NET application executable file using LZMA.
- Obsidium - Feature-rich professional software protection and licensing system designed as a cost effective and easy to implement, yet reliable and non-invasive way to protect your 32- and 64-bit Windows software applications and games from reverse engineering.
- Papaw - Permissively-licensed packer for ELF executables using LZMA Zstandard or Deflate compression.
- PEtite - Free Win32 (Windows 95/98/2000/NT/XP/Vista/7/etc) executable (EXE/DLL/etc) compressor.
- VirtualMachineObfuscationPoC - Obfuscation method using virtual machine.
- ZProtect - Renames metadata entities and supports advanced obfuscation methods that harden protection scheme and foil reverse engineering altogether.
- Alienyze - Advanced software protection and security for Windows 32-bit executables.
- Andromeda - Custom packer used in malware campaigns using RunPE techniques for evading AV mitigation methods.
- APKProtect - APK encryption and shell protection supporting Java and C++.
- AutoIT - Legitimate executable encryption service.
- BangCle - Protection tool using the second generation Android Hardening Protection, loading the encrypted DEX file from memory dynamically.
- BoxedApp Packer
- DexGuard - Android app obfuscation & security protocols for mobile app protection.
- ElecKey - Suite of software and tools that offer a complete solution for software protection, copy protection, and license management.
- ELF-Packer - Simple Polymorphic x86_64 Runtime Code Segment Cryptor.
- Enigma Protector - Professional system for executable files licensing and protection.
- EXE Bundle - Bundles application files into a single PE32 file.
- GzExe - Utility that allows to compress executables as a shell script.
- hXOR-Packer - PE packer with Huffman compression and XOR encryption.
- LIAPP - Easiest and most powerful mobile app security solution.
- PE-Packer - Simple packer for Windows 32-bits PE files.
- PE-Toy - A PE file packer.
- RapidEXE - Simple and efficient way to convert a PHP/Python script to a standalone executable.
- SimpleDPack - A very simple windows EXE packing tool for learning or investigating PE structure.
- Smart Packer - Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Squishy - Modern packer developed for 64kb demoscene productions, targets 32bit and 64bit executables.
- ASPack - Advanced solution created to provide Win32 EXE file packing and to protect them against non-professional reverse engineering.
- ASProtect 32 - Multifunctional EXE packing tool designed for software developers to protect 32-bit applications with in-built application copy protection system.
- DotBundle - GUI tool to compress, encrypt ad password-protect a .NET application or embed .NET libraries.
- MPRESS - Compresses (using LZMA) and protects PE, .NET or Mach-O programs against reverse engineering.
- OS-X_Packer - Binary packer for the Mach-O file format.
- xorPacker - Simple packer working with all PE files which cipher your exe with a XOR implementation.
- zELF - A modular ELF64 packer for Linux x86_64 featuring 22 compression codecs, ML-based codec selection, and support for both static and PIE binaries.
- Alternate EXE Packer - Compression tool for executable files (type EXE) or DLL's relying on UPX 3.96.
- Armadillo - Incorporates both a license manager and wrapper system for protecting PE files.
- ASProtect 64 - Tool for protecting 64-bit applications and .NET applications for Windows against unauthorized use, industrial and home copying, professional hacking and analysis of software products distributed over the Internet and on any physical media.
- Crinkler - Compressing linker for Windows, specifically targeted towards executables with a size of just a few kilobytes.
- EXE Stealth - Anti-cracking protection and licensing tool for PE files featuring compression and encryption polymorphic technology.
- PEShield - PE-SHiELD is a program, which encrypts 32-bit Windows EXE files, leaving them still executable.
- PESpin
- PEzoNG - Framework for automatically creating stealth binaries that target a very low detection rate in a Windows environment.
- PEzor - Open-Source Shellcode & PE Packer.
- ProtectMyTooling - Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry.
- Silent-Packer - Silent Packer is an ELF / PE packer written in pure C.
- Simple-PE32-Packer - Simple PE32 Packer with aPLib compression library.
-
Before 2000
- 32Lite - Compression tool for executable files created with Watcom C/C++ compiler.
- 624 - COM packer that can compress COM programs shorter than 25000 bytes.
- aPack - 16-bit real-mode DOS executable ( .EXE and .COM ) compressor.
- AVPack - Encrypts EXE or COM files so that they'll be able to start on your PC only.
- AXE - Program compression utility.
- CauseWay Compressor - DOS EXE compressor.
- CEXE - Compresses an input EXE into a smaller executable (only runs on WinNT, Win2000 and above - won't run on Win95 or Win98).
- EPack - EXE and COM file compressor ; works with DOS/Windows95 files.
- Fire-Pack
- LGLZ - DOS EXE and COM file compressor using modified LZ77.
- Megalite - MS-DOS executable file compressor.
- Morphine - Application for PE files encryption.
- Neolite - Compresses Windows 32-bit EXE files and DLLs.
- PACK - Executable files compressor.
- Pack-Ice
- PCShrink - Windows 9x/NT executable file compressor relying on the aPLib compression library.
- PE Diminisher - Simple PE packer relying on the aPLib compression library.
- PE-Protector - Encrypter/protector for Windows 9x/ME to protect executable files PEagainst reverse engineering or cracking with a very strong protection.
- PEBundle - Physically attaches DLL(s) to an executable, resolving dependencies in memory.
- PEPack - PE compression tool based on the code of a newer version of PE-SHiELD.
- Pro-Pack - DOS executable file compressor.
- SecuPack - Win32 executable compressor.
- SysPack - Device drivers compressor.
- T-Pack - Executable COM-FILE compressor (LZ77) optimized for small files like BBS-Addys or similar files.
- Vacuum - Runtime Compressor for DOS32 executables.
- XPA - DOS executable packer.
- JMCryptExe - DOS EXE encrypter.
- XPA - DOS executable packer.
- RERP - ROSE's EXE Relocation Packer.
- SecuPack - Win32 executable compressor.
- CC Pro - COM and EXE executable file compression utility.
- TinyProg - EXE and COM programs compressor.
- Shrinker - Compresses (up to 70%) 16 and 32 bit Windows and real mode DOS programs.
- Neolite - Compresses Windows 32-bit EXE files and DLLs.
- SPack
- ABK Scrambler - COM file scrambler and protector recoded from ABKprot.
- AEP - Addition Encode-Protective for COM and EXE file.
- AINEXE - DOS executable packer (part of the AIN Archiver suite).
- 32Lite - Compression tool for executable files created with Watcom C/C++ compiler.
- 624 - COM packer that can compress COM programs shorter than 25000 bytes.
- aPack - 16-bit real-mode DOS executable ( .EXE and .COM ) compressor.
- AVPack - Encrypts EXE or COM files so that they'll be able to start on your PC only.
- BIN-Lock - COM file scrambler for preventing reverse engineering.
- BitLok - COM and EXE file protector.
- CEXE - Compresses an input EXE into a smaller executable (only runs on WinNT, Win2000 and above - won't run on Win95 or Win98).
- COMProtector - Adds a security envelope around DOS .COM files by randomly encrypting it and adding several anti-debugging tricks.
- CrackStop - Tool that creates a security envelope around a DOS EXE file to protect it against crackers.
- Crunch - File encryptor for COM and EXE files.
- EPack - EXE and COM file compressor ; works with DOS/Windows95 files.
- ExeGuard - DOS EXE files free protector using anti-debugging ticks to prevent hacking, analysis and unpacking.
- EXELOCK 666 - Utility for protecting .EXE files so no lamers can hack out the copyright.
- Fire-Pack
- FSE - Final Fantasy Security Envelope freeware for protecting COM and EXE progams.
- LGLZ - DOS EXE and COM file compressor using modified LZ77.
- LzExe - MS-DOS executable file compressor.
- Mask - Tool that prevents COM program from being cracked by using encryption and anti-debugging tricks.
- Megalite - MS-DOS executable file compressor.
- Mess - This tool does the same as HackStop, with the exception that it is freeware for non-commercial use.
- Morphine - Application for PE files encryption.
- PACK - Executable files compressor.
- Pack-Ice
- PCShrink - Windows 9x/NT executable file compressor relying on the aPLib compression library.
- PE Diminisher - Simple PE packer relying on the aPLib compression library.
- PE-Protector - Encrypter/protector for Windows 9x/ME to protect executable files PEagainst reverse engineering or cracking with a very strong protection.
- PEPack - PE compression tool based on the code of a newer version of PE-SHiELD.
- PKlite - Easy-to-use file compression program for compressing DOS and Windows executable files.
- Pro-Pack - DOS executable file compressor.
- Scorpion - EXE and COM file encrypter and protector.
- SecuPack - Win32 executable compressor.
- $PIRIT - COM/EXE executable files polymorphic encryptor.
- TRAP - EXE and COM files encrypter and protector.
- WWPack - Squeezes EXE files, compresses relocation tables, optimizes headers, protects EXE files from hacking.
- XE - PE32 image file packer and rebuilder.
- XorCopy - COM file XOR-based encrypter.
- XORER - COM file XOR-based encrypter.
- XPack - EXE/COM/SYS executable file compressor.
- CauseWay Compressor - DOS EXE compressor.
- PEBundle - Physically attaches DLL(s) to an executable, resolving dependencies in memory.
- Gardian Angel - COM and EXE encrypter and protector using a variety of anti-debugging tricks.
- SysPack - Device drivers compressor.
- WinLite - Compresses Windows executables (such as Pklite, Diet or Wwpack) for executables programs under DOS.
- RJCrush - EXE and COM files compressor with the ability to compress overlays.
- AXE - Program compression utility.
- T-Pack - Executable COM-FILE compressor (LZ77) optimized for small files like BBS-Addys or similar files.
- Vacuum - Runtime Compressor for DOS32 executables.
-
-
:wrench: Tools
-
Before 2000
- PEiD (CLI) - Python implementation of PEiD featuring an additional tool for making new signatures.
- Assiste (Packer) - Assiste.com's example list of packers.
- BitBlaze - Analysis platform that features a novel fusion of static and dynamic analysis techniques, mixed concrete and symbolic execution, and whole-system emulation and binary instrumentation, all to facilitate state-of-the art research on real security problems.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- CFF Explorer - PE32/64 and .NET editor, part of the Explorer Suite.
- ChkEXE - Identifies almost any EXE/COM packer, crypter or protector.
- Clamscan Unpacker - Unpacker derived from ClamAV.
- DynamoRIO - Runtime code manipulation system that supports code transformations on any part of a program, while it executes.
- EtherUnpack - Precision universal automated unpacker (successor of PolyUnpack).
- Eureka - Binary static analysis preparation framework implementing a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing.
- EXETools - Forum for reverse engineering and executale packing related topics.
- GUnpacker - Shell tool that performs OEP positioning and dumps decrypted code.
- Language 2000 - Ultimate compiler detection utility.
- MRC - (Mandiant Red Curtain) Free software for Incident Responders that assists with the analysis of malware ; it examines executable files (e.g., .exe, .dll, and so on) to determine how suspicious they are based on a set of criteria.
- PackerBreaker - Tool for helping unpack, decompress and decrypt most of the programs packed, compressed or encrypted using advanced emulation technology.
- PCjs - PCjs uses JavaScript to recreate the IBM PC experience, using original ROMs, CPUs running at their original speeds, and early IBM video cards and monitors.
- PE Compression Test - List of packers tested on a few sample executables for comparing compressed sizes.
- PE Detective - This GUI tool can scan single PE files or entire directories (also recursevely) and generate complete reports.
- PEiD - Packed Executable iDentifier.
- PEview - Provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
- PExplorer - Most feature-packed program for inspecting the inner workings of your own software, and more importantly, third party Windows applications and libraries for which you do not have source code.
- PROTECTiON iD - PE file signature-based scanner.
- Quick Unpack - Generic unpacker that facilitates the unpacking process.
- RDG Packer Detector - Packer detection tool.
- REMnux - Linux toolkit for reverse-engineering and analyzing malicious software.
- ResourceHacker - Resource editor for 32bit and 64bit Windows applications.
- StudPE - PE viewer and editor (32/64 bit).
- Titanium Platform - Machine learning hybrid cloud platform that harvests thousands of file types at scale, speeds threat detection through machine learning binary analysis, and continuously monitors an index of over 10B files for future threats.
- Tuts 4 You - Non-commercial, independent community dedicated to the sharing of knowledge and information on reverse code engineering.
- UnpacMe - Automated malware unpacking service.
- Uunp (IDA Pro plugin) - IDA Pro debugger plug-in module automating the analysis and unpacking of packed binaries.
- VMUnpacker - Unpacker based on the technology of virtual machine.
- OmniUnpack - New technique for fast, generic, and safe unpacking of malware by monitoring the execution in real-time and detecting the removed layers of packing.
- REMINDer - Packing detection tool based on the entropy value of the entry point section and the WRITE attribute.
- IDR - Interactive Delphi Reconstructor.
- PETools - Old-school reverse engineering tool (with a long history since 2002) for manipulating PE files.
- BitBlaze - Analysis platform that features a novel fusion of static and dynamic analysis techniques, mixed concrete and symbolic execution, and whole-system emulation and binary instrumentation, all to facilitate state-of-the art research on real security problems.
- Eureka - Binary static analysis preparation framework implementing a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing.
- Manalyze - Robust parser for PE files with a flexible plugin architecture which allows users to statically analyze files in-depth.
- PE-bear - Freeware reversing tool for PE files aimed to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.
- OmniUnpack - New technique for fast, generic, and safe unpacking of malware by monitoring the execution in real-time and detecting the removed layers of packing.
- PackerID - Fork of packerid.py using PEid signatures and featuring additional output types, formats, digital signature extraction, and disassembly support.
- Packing-Box - Docker image gathering many packing-related tools and for making datasets of packed executables for use with machine learning.
- VMUnpacker - Unpacker based on the technology of virtual machine.
- Winbindex - An index of Windows binaries, including download links for executables such as EXE, DLL and SYS files.
- OllyDbg Scripts - Collection of OllyDbg scripts for unpacking many different packers.
- Pandora's Bochs - Extension to the Bochs PC eumlator to enable it to monitor execution of the unpacking stubs for extracting the original code.
- ProTools - Programmer's Tools, a web site dedicated for all kinds of tools and utilities for the true WinBloze programmer, including packers, crypters, etc.
- ResourceHacker - Resource editor for 32bit and 64bit Windows applications.
- RDG Packer Detector - Packer detection tool.
- Angr - Platform-agnostic binary analysis framework.
- Bintropy - Prototype analysis tool that estimates the likelihood that a binary file contains compressed or encrypted bytes.
- PEiD - Packed Executable iDentifier.
- StudPE - PE viewer and editor (32/64 bit).
- TrID - Utility for identifying file types from their binary signatures.
- EXETools - Forum for reverse engineering and executale packing related topics.
- FUU - Fast Universal Unpacker.
- GetTyp - File format detection program for DOS based on special strings and byte code.
- Unpckarc - Packed executables detection tool relying on several heuristics.
- UUP - Universal exe-file UnPacker.
- VMHunt - Set of tools for analyzing virtualized binary code ; now only supports 32 bit traces.
- yarGen - Generator for YARA rules - The main principle is the creation of yara rules from strings found in malware files while removing all strings that also appear in goodware files.
- Android Unpacker - Presented at Defcon 22: Android Hacker Protection Level 0.
- AppSpear - Universal and automated unpacking system suitable for both Dalvik and ART.
- AVClass - Python tools to tag / label malware samples.
- de4js - JavaScript Deobfuscator and Unpacker.
- Defacto2 Analyzers Archive - Collection of 60 binary files analysers for MS-DOS and Windows32 from the 1990s and the 2000s.
- Defacto2 Packers Archive - Collection of 460 binary and data file packers for MS-DOS and Windows32 from the 1990s and 2000s.
- Emulator - Symantec Endpoint Protector (from v14) capability to create a virtual machine on the fly to identify, detonate, and eliminate malware hiding inside custom malware packers.
- ImpREC - This can be used to repair the import table for packed programs.
- LIEF - Library to Instrument Executable Formats ; Python package for parsing PE, ELF, Mach-O and DEX formats, modifying and rebuilding executables.
- LordPE - PE header viewer, editor and rebuilder.
- Malheur - Tool for the automatic analysis of malware behavior (recorded from malicious software in a sandbox environment).
- MalUnpack - Dynamic unpacker based on PE-sieve.
- Pin - Dynamic binary instrumentation framework for the IA-32, x86-64 and MIC instruction-set architectures that enables the creation of dynamic program analysis tools.
- PINdemonium - Unpacker for PE files exploiting the capabilities of PIN.
- PolyUnpack - Implemention attempt of the general approach for extracting the original hidden code of PE files without any heuristic assumptions.
- PyPackerDetect - Small Python script/library to detect whether an executable is packed.
- PyPeid - Yet another implementation of PEiD with yara-python.
- Quick Unpack - Generic unpacker that facilitates the unpacking process.
- RDG Packer Detector - Packer detection tool.
- UU - Universal Unpacker.
- BinUnpack - Unpacking approach free from tedious memory access monitoring, therefore introducing very small runtime overhead.
- Justin - Just-In-Time AV scanning ; generic unpacking solution.
- PackID - Packer identification multiplatform tool/library using the same database syntax as PEiD.
- PANDA - Platform for Architecture-Neutral Dynamic Analysis.
- PANDI - Dynamic packing detection solution built on top of PANDA.
- PEFrame - Tool for performing static analysis on PE malware and generic suspicious files.
- Bintropy - Prototype analysis tool that estimates the likelihood that a binary file contains compressed or encrypted bytes.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- CFF Explorer - PE32/64 and .NET editor, part of the Explorer Suite.
- ChkEXE - Identifies almost any EXE/COM packer, crypter or protector.
- Clamscan Unpacker - Unpacker derived from ClamAV.
- COM2EXE - Free tool for converting COM files to EXE format.
- DynamoRIO - Runtime code manipulation system that supports code transformations on any part of a program, while it executes.
- EtherUnpack - Precision universal automated unpacker (successor of PolyUnpack).
- Language 2000 - Ultimate compiler detection utility.
- Packing-Box - Docker image gathering many packing-related tools and for making datasets of packed executables for use with machine learning.
- PCjs - Uses JavaScript to recreate the IBM PC experience, using original ROMs, CPUs running at their original speeds, and early IBM video cards and monitors.
- PE Detective - This GUI tool can scan single PE files or entire directories (also recursevely) and generate complete reports.
- PEiD (CLI) - Python implementation of PEiD featuring an additional tool for making new signatures.
- PEview - Provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
- PExplorer - Most feature-packed program for inspecting the inner workings of your own software, and more importantly, third party Windows applications and libraries for which you do not have source code.
- ProTools - Programmer's Tools, a web site dedicated for all kinds of tools and utilities for the true WinBloze programmer, including packers, crypters, etc.
- REMnux - Linux toolkit for reverse-engineering and analyzing malicious software.
- APKiD - Android application Identifier for packers, protectors, obfuscators and oddities - PEiD for Android.
- aPLib - Compression library based on the algorithm used in aPACK.
- Assiste (Packer) - Assiste.com's example list of packers.
- DSFF - DataSet File Format for exchanging datasets and converting to ARFF (for use with Weka), CSV or Packing-Box's dataset structure.
- .NET Deobfuscator - List of .NET Deobfuscators and Unpackers.
- OEPdet - Automated original-entry-point detector.
- PROTECTiON iD - PE file signature-based scanner.
- Reko - Free decompiler for machine code binaries.
- ShowStopper - Tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
- Binutils - The GNU Binutils are a collection of binary tools for Linux (it namely includes Readelf).
- EXEInfo-PE - Fast detector for executable PE files.
- MRC - (Mandiant Red Curtain) Free software for Incident Responders that assists with the analysis of malware ; it examines executable files (e.g., .exe, .dll, and so on) to determine how suspicious they are based on a set of criteria.
- PackerAttacker - Tool that uses memory and code hooks to detect packers.
- PackerBreaker - Tool for helping unpack, decompress and decrypt most of the programs packed, compressed or encrypted using advanced emulation technology.
- PackerGrind - Adaptive unpacking tool for tracking packing bahaviors and unpacking Android packed apps.
- PEdump - Dump windows PE files using Ruby.
- Pefeats - Utility for extracting 119 features from a PE file for use with machine learning algorithms.
- Pefile - Multi-platform Python module to parse and work with Portable Executable files.
- PEiD (yara) - Yet another implementation of PEiD with yara.
- PE Compression Test - List of packers tested on a few sample executables for comparing compressed sizes.
- PROTECTiON iD - PE file signature-based scanner.
- PyPackerDetect (refactored) - A complete refactoring of the original project to a Python package with a console script to detect whether an executable is packed.
- SymPack - Safe, portable, largely effective but not generic library for packing detection and unpacking ; part of the Norton Antivirus solution.
- Triton - Dynamic binary analysis library.
- Unipacker - Automatic and platform-independent unpacker for Windows binaries based on emulation.
- Uundo - Universal Undo - Universal Unpacker.
- NotPacked++ - Attack tool for altering packed samples so that they evade static packing detection.
- Oedipus - A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.
- PeLib - PE file manipulation library.
- PEPack - PE file packer detection tool, part of the Unix package "pev".
- PEscan - CLI tool to scan PE files to identify how they were constructed.
- REMINDer - Packing detection tool based on the entropy value of the entry point section and the WRITE attribute.
- Renovo - Detection tool built on top of TEMU (dynamic analysis component of BitBlaze) based on the execution of newly-generated code and monitoring memory writes after the program starts.
- RetDec - Retargetable machine-code decompiler based on LLVM.
- RTD - Rose Patch - TinyProt/Rosetiny Unpacker.
- RUPP - ROSE SWE UnPaCKER PaCKaGE (for DOS executables only).
- SecML Malware - Create adversarial attacks against machine learning Windows malware detectors.
- de4dot - .NET deobfuscator and unpacker.
- Capa - Open-source tool to identify capabilities in PE, ELF or .NET executable files.
- Cave-Finder - Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files.
- Defacto2 Unpackers Archive - Collection of 152 binary files unpackers for MS-DOS and Windows 32 from the 1990s and 2000s.
- DIE - Detect It Easy ; Program for determining types of files.
- ExeScan - Executable file analyzer which detects the most famous EXE/COM Protectors, Packers, Converters and compilers.
- GUnpacker - Shell tool that performs OEP positioning and dumps decrypted code.
- Gym-Malware - This is a malware manipulation environment for OpenAI's gym.
- PE Compression Test - List of packers tested on a few sample executables for comparing compressed sizes.
- PEiD - Packed Executable iDentifier.
-
-
:bookmark_tabs: Datasets
-
Scientific Research
- ViruSign - Another online malware database.
- VirusShare - Virus online database with more than 44 millions of samples.
- VX Underground - PL-CERT based open source MWDB python application holding a malware database containing every APT sample from 2010 and over 7.5M maliciousbinaries.
- VXvault - Online malware database.
- WildList - Cooperative listing of malwares reported as being in the wild by security professionals.
- Contagio - Contagio is a collection of the latest malware samples, threats, observations, and analyses.
- Malfease - Dataset of about 5,000 packed malware samples.
- Malheur - Contains the recorded behavior of malicious software (malware) and has been used for developing methods for classifying and clustering malware behavior (see the JCS article from 2011).
- Malicia - Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- MalShare - Free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
- MalwareBazaar - Project operated by abuse.ch aimed to collect and share malware samples, helping IT-security researchers and threat analysts protecting their constituency and customers from cyber threats.
- MalwareGallery - Yet another malware collection in the Internet.
- MalwareTips - MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats.
- OARC Malware Dataset - Semi-public dataset of 3,467 samples captured in the wild from Sep 2005 to Jan 2006 by mail traps, user submissions, honeypots and other sources aggregated by the OARC, available to qualified academic and industry researchers upon request.
- Malicia - Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- The Malware Museum - Collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers.
- PackingData - Original dataset with sample PE files packed with a large variety of packers, including ASPack, BeRoEXEPacker, exe32pack, eXpressor, FSG, JDPack, MEW, Molebox, MPRESS, Neolite, NSPack, Pckman, PECompact, PEtite, RLPack, UPX, WinUpack, Yoda's Crypter and Yoda's Protector.
- Dataset of Packed ELF - Dataset of packed ELF samples.
- Dataset of Packed PE - Sanitized version of the original dataset, PackingData, removing packed samples from the Notpacked folder but also samples in packer folders that failed to be packed (having a same hash as the original unpacked executable).
- SOREL - Sophos-ReversingLabs 20 Million dataset.
- Malheur - Contains the recorded behavior of malicious software (malware) and has been used for developing methods for classifying and clustering malware behavior (see the JCS article from 2011).
- VirusSamples
- MalwareGallery - Yet another malware collection in the Internet.
- VXvault - Online malware database.
- BODMAS - Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
- CyberCrime - C² tracking and malware database.
- Ember - Collection of features from PE files that serve as a benchmark dataset for researchers.
- Ember2024 - Update to the EMBER2017 and EMBER2018 datasets.
- FFRI Dataset Scripts - Make datasets like FFRI Dataset.
- Open Malware Project - Online collection of malware samples (formerly Offensive Computing).
- ViruSign - Another online malware database.
- VirusTotal - File analysis Web service for detecting malware.
- VX Heaven - Site dedicated to providing information about computer viruses.
- MalwareBazaar - Project operated by abuse.ch aimed to collect and share malware samples, helping IT-security researchers and threat analysts protecting their constituency and customers from cyber threats.
- MalwareGallery - Yet another malware collection in the Internet.
- MalwareTips - Community-driven platform providing the latest information and resources on malware and cyber threats.
- OARC Malware Dataset - Semi-public dataset of 3,467 samples captured in the wild from Sep 2005 to Jan 2006 by mail traps, user submissions, honeypots and other sources aggregated by the OARC, available to qualified academic and industry researchers upon request.
- VirusSamples - Best of the worst kind of files on the Internet.
- VirusSign - Giant database dedicated to combating malware in the digital world.
- MaleX - Curated dataset of malware and benign Windows executable samples for malware researchers containing 1,044,394 Windows executable binaries and corresponding image representations with 864,669 labelled as malware and 179,725 as benign.
- Malicia - Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- VX Underground - PL-CERT based open source MWDB python application holding a malware database containing every APT sample from 2010 and over 7.5M maliciousbinaries.
- WildList - Cooperative listing of malwares reported as being in the wild by security professionals.
- MalwareSamples - Bringing you the best of the worst files on the Internet.
- Malfease - Dataset of about 5,000 packed malware samples.
- theZoo - Project created to make the possibility of malware analysis open and available to the public.
- VirusShare - Virus online database with more than 44 millions of samples.
- Contagio - Collection of the latest malware samples, threats, observations, and analyses.
- Dataset of Packed ELF - Compilation of packed ELF samples.
- Dataset of Packed PE - Sanitized version of the original dataset, PackingData, removing packed samples from the Notpacked folder but also samples in packer folders that failed to be packed (having a same hash as the original unpacked executable).
- Malheur - Contains the recorded behavior of malicious software (malware) and has been used for developing methods for classifying and clustering malware behavior (see the JCS article from 2011).
- MalShare - Free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
- Malware Archive - Malware samples, analysis exercises and other interesting resources.
- Packware - Datasets and codes that are needed to reproduce the experiments in the paper "When Malware is Packing Heat".
- RCE Lab - Crackme's, keygenme's, serialme's ; the "tuts4you" folder contains many packed binaries.
- Runtime Packers Testset - Dataset of 10 common Malware files, packed with about 40 different runtime packers in over 500 versions and options, with a total of about 5,000 samples.
- SAC - Slovak Antivirus Center, non-commercial project of AVIR and ESET companies ; contains packers, detectors and unpackers.
- SOREL - Sophos-ReversingLabs 20 Million dataset.
-
Programming Languages
Categories
Sub Categories
Keywords
malware-analysis
11
malware-research
9
reverse-engineering
9
binary-analysis
6
malware
5
python
5
machine-learning
4
unpacker
4
pe-file
4
packer
4
executable-packing
3
windows
3
elf-binaries
3
upx
3
pe-format
3
security
3
malware-packers
3
android
3
dotnet
3
elf
3
pe
2
c
2
encryption
2
malware-detection
2
lief
2
mach-o
2
x86-64
2
packers
2
malwareanalysis
2
deobfuscator
2
analysis
2
disassembler
2
dumper
2
entropy
2
pefile
2
qemu
2
dataset
2
elf-format
2
samples
2
pe-files
2
malware-samples
2
portable-executable
2
yara
2
ollvm
1
static-analysis
1
obfuscate
1
windowsdriver
1
abi
1
apple
1
osx
1