Server-side dynamic code analysis

  title={Server-side dynamic code analysis},
  author={Wadie Guizani and Jean-Yves Marion and Daniel Reynaud-Plantey},
  journal={2009 4th International Conference on Malicious and Unwanted Software (MALWARE)},
The common use of packers is a real challenge for the anti-virus community. Indeed, a static signature analysis can usually only detect and sometimes remove known packers if a specific unpacking routine has been programmed manually. Generic unpacking does not solve the problem due to its limited effectiveness. Additionally, the important number of binaries to scan on a daily basis makes automated analysis necessary in order to protect information systems. In this context, we propose a taxonomy… CONTINUE READING
Highly Cited
This paper has 17 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 12 extracted citations


Publications referenced by this paper.
Showing 1-10 of 23 references

Red pill... or how to detect vmm using (almost) one

J. Rutkowska
cpu instruction, • 2004
View 3 Excerpts
Highly Influenced

Alternative medicine: The malware analyst’s bluepill

P. Royal
In Black Hat USA, • 2008
View 1 Excerpt

Extending joebox - a scriptable malware analysis

S. Bühlmann
University of Applied Sciences Northwestern Switzerland • 2008
View 2 Excerpts

Malware - behavior, tools, scripting and advanced analysis

E. Carrera
In HITB, • 2008
View 1 Excerpt

Pandora’s bochs: Automatic unpacking of malware

L. Boehne
View 2 Excerpts

Scoopyng - the vmware detection

T. Klein
View 1 Excerpt

Security applications for emulation

S. Cesare
Ruxcon, • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…