Published in: Dagstuhl Reports, Volume 4, Issue 6 (2015)
Roberto Giacobazzi, Axel Simon, and Sarah Zennou. Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241). In Dagstuhl Reports, Volume 4, Issue 6, pp. 48-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{giacobazzi_et_al:DagRep.4.6.48,
author = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah},
title = {{Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241)}},
pages = {48--63},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2014},
volume = {4},
number = {6},
editor = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.6.48},
URN = {urn:nbn:de:0030-drops-47627},
doi = {10.4230/DagRep.4.6.48},
annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation}
}
Published in: Dagstuhl Reports, Volume 2, Issue 1 (2012)
Andy M. King, Alan Mycroft, Thomas W. Reps, and Axel Simon. Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051). In Dagstuhl Reports, Volume 2, Issue 1, pp. 100-116, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{king_et_al:DagRep.2.1.100,
author = {King, Andy M. and Mycroft, Alan and Reps, Thomas W. and Simon, Axel},
title = {{Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)}},
pages = {100--116},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2012},
volume = {2},
number = {1},
editor = {King, Andy M. and Mycroft, Alan and Reps, Thomas W. and Simon, Axel},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.100},
URN = {urn:nbn:de:0030-drops-34585},
doi = {10.4230/DagRep.2.1.100},
annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation}
}