Published in: Dagstuhl Reports, Volume 4, Issue 6 (2015)
Roberto Giacobazzi, Axel Simon, and Sarah Zennou. Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241). In Dagstuhl Reports, Volume 4, Issue 6, pp. 48-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{giacobazzi_et_al:DagRep.4.6.48, author = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah}, title = {{Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241)}}, pages = {48--63}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {4}, number = {6}, editor = {Giacobazzi, Roberto and Simon, Axel and Zennou, Sarah}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.6.48}, URN = {urn:nbn:de:0030-drops-47627}, doi = {10.4230/DagRep.4.6.48}, annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation} }
Published in: Dagstuhl Reports, Volume 2, Issue 1 (2012)
Andy M. King, Alan Mycroft, Thomas W. Reps, and Axel Simon. Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051). In Dagstuhl Reports, Volume 2, Issue 1, pp. 100-116, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{king_et_al:DagRep.2.1.100, author = {King, Andy M. and Mycroft, Alan and Reps, Thomas W. and Simon, Axel}, title = {{Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)}}, pages = {100--116}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {King, Andy M. and Mycroft, Alan and Reps, Thomas W. and Simon, Axel}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.100}, URN = {urn:nbn:de:0030-drops-34585}, doi = {10.4230/DagRep.2.1.100}, annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation} }
Feedback for Dagstuhl Publishing