Server-side dynamic code analysis

@article{Guizani2009ServersideDC,
  title={Server-side dynamic code analysis},
  author={Wadie Guizani and Jean-Yves Marion and Daniel Reynaud-Plantey},
  journal={2009 4th International Conference on Malicious and Unwanted Software (MALWARE)},
  year={2009},
  pages={55-62}
}
The common use of packers is a real challenge for the anti-virus community. Indeed, a static signature analysis can usually only detect and sometimes remove known packers if a specific unpacking routine has been programmed manually. Generic unpacking does not solve the problem due to its limited effectiveness. Additionally, the important number of binaries to scan on a daily basis makes automated analysis necessary in order to protect information systems. In this context, we propose a taxonomy… CONTINUE READING
Highly Cited
This paper has 17 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 23 references

Red pill... or how to detect vmm using (almost) one

J. Rutkowska
cpu instruction, • 2004
View 3 Excerpts
Highly Influenced

Alternative medicine: The malware analyst’s bluepill

P. Royal
In Black Hat USA, • 2008
View 1 Excerpt

Extending joebox - a scriptable malware analysis

S. Bühlmann
University of Applied Sciences Northwestern Switzerland • 2008
View 2 Excerpts

Malware - behavior, tools, scripting and advanced analysis

E. Carrera
In HITB, • 2008
View 1 Excerpt

Pandora’s bochs: Automatic unpacking of malware

L. Boehne
2008
View 2 Excerpts

Scoopyng - the vmware detection

T. Klein
2008
View 1 Excerpt

Security applications for emulation

S. Cesare
Ruxcon, • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…