Anti-Disassembly using Cryptographic Hash Functions
dc.contributor.author | Aycock, John | eng |
dc.contributor.author | deGraaf, Rennie | eng |
dc.contributor.author | Jacobson Jr, Michael | eng |
dc.date.accessioned | 2008-02-26T20:21:50Z | |
dc.date.available | 2008-02-26T20:21:50Z | |
dc.date.computerscience | 2005-07-18 | eng |
dc.date.issued | 2005-07-18 | eng |
dc.description.abstract | Computer viruses sometimes employ coding techniques intended to make analysis difficult for anti-virus researchers; techniques to obscure code to impair static code analysis are called anti-disassembly techniques. We present a new method of anti-disassembly based on cryptographic hash functions which is portable, hard to analyze, and can be used to target particular computers or users. Furthermore, the obscured code is not available in any analyzable form, even an encrypted form, until it successfully runs. The method s viability has been empirically confirmed. We look at possible countermeasures for the basic anti-disassembly scheme, as well as variants scaled to use massive computational power. | eng |
dc.description.notes | We are currently acquiring citations for the work deposited into this collection. We recognize the distribution rights of this item may have been assigned to another entity, other than the author(s) of the work.If you can provide the citation for this work or you think you own the distribution rights to this work please contact the Institutional Repository Administrator at digitize@ucalgary.ca | eng |
dc.identifier.department | 2005-793-24 | eng |
dc.identifier.doi | http://dx.doi.org/10.11575/PRISM/30283 | |
dc.identifier.uri | http://hdl.handle.net/1880/45373 | |
dc.language.iso | Eng | eng |
dc.publisher.corporate | University of Calgary | eng |
dc.publisher.faculty | Science | eng |
dc.subject | Computer Science | eng |
dc.title | Anti-Disassembly using Cryptographic Hash Functions | eng |
dc.type | unknown | |
thesis.degree.discipline | Computer Science | eng |
Files
License bundle
1 - 1 of 1