{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:02:20Z","timestamp":1729634540760,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/malware.2010.5665795","type":"proceedings-article","created":{"date-parts":[[2010,12,21]],"date-time":"2010-12-21T23:39:39Z","timestamp":1292974779000},"page":"47-54","source":"Crossref","is-referenced-by-count":0,"title":["Unconditional self-modifying code elimination with dynamic compiler optimizations"],"prefix":"10.1109","author":[{"given":"Isabelle","family":"Gnaedig","sequence":"first","affiliation":[]},{"given":"Matthieu","family":"Kaczmarek","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Reynaud","sequence":"additional","affiliation":[]},{"given":"Stephane","family":"Wloka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Partial evaluation and automatic program generation","year":"1993","author":"jones","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0046-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1707801.1706313"},{"key":"ref17","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1014007.1014010"},{"key":"ref19","first-page":"289","article-title":"Polyunpack: Automating the hidden-code extraction of unpack-executing malware","author":"royal","year":"2006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.121"},{"journal-title":"Efficient transparent and comprehensive runtime code manipulation","year":"2004","author":"bruening","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010095604496"},{"key":"ref7","article-title":"Anti-unpacker tricks","author":"ferrie","year":"2008","journal-title":"Proc 2nd Int Workshop"},{"key":"ref2","article-title":"Automatic unpacking of malware","author":"b\u00f6hne","year":"2008","journal-title":"University of Mannheim"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-540-87403-4_6","article-title":"A study of the packer problem and its solutions","author":"guo","year":"2008","journal-title":"Recent Advances in Intrusion Detection"},{"journal-title":"Bochs","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","article-title":"BitBlaze: A new approach to computer security via binary analysis","author":"song","year":"2008","journal-title":"Information Systems Security"},{"article-title":"The art of computer virus research and defense","year":"2005","author":"szor","key":"ref22"},{"journal-title":"Hump-and-dump efficient generic unpacking using an ordered address execution histogram","year":"2008","author":"sun","key":"ref21"},{"key":"ref24","article-title":"Cross site scripting prevention with dynamic data tainting and static analysis","volume":"42","author":"vogt","year":"2007","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)"},{"key":"ref23","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"Journal of Programming Languages"},{"key":"ref25","first-page":"127","article-title":"Panorama: Capturing system-wide information flow for malware detection and analysis","author":"yin","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"}],"event":{"name":"2010 5th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2010,10,19]]},"location":"Nancy, France","end":{"date-parts":[[2010,10,20]]}},"container-title":["2010 5th International Conference on Malicious and Unwanted Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655114\/5665785\/05665795.pdf?arnumber=5665795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:30:45Z","timestamp":1497893445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5665795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/malware.2010.5665795","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}