{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:22:45Z","timestamp":1768317765360,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540874027","type":"print"},{"value":"9783540874034","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_6","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"98-115","source":"Crossref","is-referenced-by-count":111,"title":["A Study of the Packer Problem and Its Solutions"],"prefix":"10.1007","author":[{"given":"Fanglu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Peter","family":"Ferrie","sequence":"additional","affiliation":[]},{"given":"Tzi-cker","family":"Chiueh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Oberhumer, M.F., Moln\u00e1r, L., Reiser, J.F.: UPX: the Ultimate Packer for eXecutables (2007), \n                    \n                      http:\/\/upx.sourceforge.net\/"},{"key":"6_CR2","unstructured":"ASPACK SOFTWARE, ASPack for Windows (2007), \n                    \n                      http:\/\/www.aspack.com\/aspack.html"},{"key":"6_CR3","unstructured":"bart, FSG: [F]ast [S]mall [G]ood exe packer (2005), \n                    \n                      http:\/\/www.xtreeme.prv.pl\/"},{"key":"6_CR4","unstructured":"Dwing, WinUpack 0.39final (2006), \n                    \n                      http:\/\/dwing.51.net\/"},{"key":"6_CR5","unstructured":"Oreans Technology, Themida: Advanced Windows Software Protection System (2008), \n                    \n                      http:\/\/www.oreans.com\/themida.php"},{"key":"6_CR6","unstructured":"Silicon Realms, Armadillo\/SoftwarePassport (2008), \n                    \n                      http:\/\/www.siliconrealms.com\/"},{"key":"6_CR7","unstructured":"Blinkinc, Shrinker 3.4 (2008), \n                    \n                      http:\/\/www.blinkinc.com\/shrinker.htm"},{"key":"6_CR8","unstructured":"Ferrie, P.: Attacks on Virtual Machines. In: Proceedings 9th Annual AVAR International Conference (2006)"},{"key":"6_CR9","unstructured":"VMProtect, VMProtect (2008), \n                    \n                      http:\/\/www.vmprotect.ru\/"},{"key":"6_CR10","unstructured":"Symantec Corporation (2008), \n                    \n                      http:\/\/www.symantec.com\/"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R. Lyda","year":"2007","unstructured":"Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Security and Privacy\u00a05(2), 40\u201345 (2007)","journal-title":"IEEE Security and Privacy"},{"key":"6_CR12","unstructured":"Prakash, C.: Design of X86 Emulator for Generic Unpacking. In: Proceedings of 10th Annual AVAR International Conference (2007)"},{"key":"6_CR13","unstructured":"Tan, X.: Anti-unpacker Tricks in Malicious Code. In: Proceedings of 10th Annual AVAR International Conference (2007)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Royal, P., Halpin, M., Dagon, D., Edmonds, R., Lee, W.: Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pp. 289\u2013300 (2006)","DOI":"10.1109\/ACSAC.2006.38"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Kang, M.G., Poosankam, P., Yin, H.: Renovo: A hidden code extractor for packed executables. In: Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM) (Oct. 2007)","DOI":"10.1145\/1314389.1314399"},{"key":"6_CR16","unstructured":"Stewart, J.: OllyBonE v0.1, Break-on-Execute for OllyDbg (2006), \n                    \n                      http:\/\/www.joestewart.org\/ollybone\/"},{"key":"6_CR17","unstructured":"Quist, D., Valsmith,: Covert Debugging: Circumventing Software Armoring. In: Proceedings of Black Hat USA (2007)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Martignoni, L., Christodorescu, M., Jha, S.: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In: 23rd Annual Computer Security Applications Conference (ACSAC) (2007)","DOI":"10.1109\/ACSAC.2007.15"},{"key":"6_CR19","unstructured":"Nanda, S., Li, W., chung Lam, L., cker Chiueh, T.: BIRD: Binary Interpretation using Runtime Disassembly. In: Proceedings of the 4th IEEE\/ACM Conference on Code Generation and Optimization (CGO 2006) (2006)"},{"key":"6_CR20","unstructured":"NX bit, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/NX_bit"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:44Z","timestamp":1619524664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}