Executable compression

Known as: EXE Packers, EXE packer, Packed executable 
Executable compression is any means of compressing an executable file and combining the compressed data with decompression code into a single… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2016
02419972016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Extreme learning machine (ELM) has been an important research topic over the last decade due to its high efficiency, easy… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2014
2014
Malware packing is a common technique employed to hide malicious code and to avoid static analysis. In order to fully inspect the… (More)
Is this relevant?
2014
2014
This paper proposes a novel method of detecting packed executable files using steganalysis, primarily targeting the detection of… (More)
  • figure 2
  • figure 1
  • figure 5
  • figure 3
  • table 1
Is this relevant?
2011
2011
Malware is any software designed to harm computers. Commercial anti-virus are based on signature scanning, which is a technique… (More)
  • table 1
  • figure 1
Is this relevant?
2011
2011
The term malware is coined to name any software with malicious intentions. One of the methods malware writers use for hiding… (More)
  • figure 2
  • figure 3
  • table I
Is this relevant?
2011
2011
Malware is any software with malicious intentions. Commercial anti-malware software relies on signature databases. This approach… (More)
  • table 1
Is this relevant?
2008
2008
In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2008
2008
The VMware Workstation virtualisation software is widely used by antivirus researchers for malware analysis. However, a large… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Recent advances in anti-malware technologies have steered the security industry away from maintaining vast signature databases… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Current research in compiler optimization counts mainly CPU time and perhaps the first cache level or two. This view has been… (More)
Is this relevant?