A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
Malicious code often use a variety of anti-analysis and antitampering defenses to hinder analysis. Researchers trying to understand the internal logic of the malware have to penetrate these defenses. Existing research on such antianalysis defenses tend to study them in isolation, thereby failing to see underlying conceptual similarities between different kinds of anti-analysis defenses. This paper proposes an information-flow-based framework that encompasses a wide variety of anti-analysisdoi:10.1145/2689702.2689704 dblp:conf/acsac/QiuYJDS14 fatcat:yt6sokgqxbfzlnatdou3g5nlpy