Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Deobfuscation). Showing records 1 – 7 of 7 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Janssen, M. (author). Combining learning with fuzzing for software deobfuscation.

Degree: 2016, Delft University of Technology

Software obfuscation is widely applied to prevent reverse engineering of applications. However, to evaluate security and validate behaviour we are interested in analysis such software.… (more)

Subjects/Keywords: active learning; fuzzing; deobfuscation; reverse engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janssen, M. (. (2016). Combining learning with fuzzing for software deobfuscation. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce

Chicago Manual of Style (16th Edition):

Janssen, M (author). “Combining learning with fuzzing for software deobfuscation.” 2016. Masters Thesis, Delft University of Technology. Accessed May 07, 2021. http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce.

MLA Handbook (7th Edition):

Janssen, M (author). “Combining learning with fuzzing for software deobfuscation.” 2016. Web. 07 May 2021.

Vancouver:

Janssen M(. Combining learning with fuzzing for software deobfuscation. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2021 May 07]. Available from: http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce.

Council of Science Editors:

Janssen M(. Combining learning with fuzzing for software deobfuscation. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce


University of Arizona

2. Coogan, Kevin Patrick. Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries .

Degree: 2011, University of Arizona

 Code obfuscation techniques are increasingly being used in software for such reasons as protecting trade secret algorithms from competitors and deterring license tampering by those… (more)

Subjects/Keywords: malware; packing; security; virtualization; Computer Science; binary analysis; deobfuscation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coogan, K. P. (2011). Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/202716

Chicago Manual of Style (16th Edition):

Coogan, Kevin Patrick. “Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries .” 2011. Doctoral Dissertation, University of Arizona. Accessed May 07, 2021. http://hdl.handle.net/10150/202716.

MLA Handbook (7th Edition):

Coogan, Kevin Patrick. “Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries .” 2011. Web. 07 May 2021.

Vancouver:

Coogan KP. Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries . [Internet] [Doctoral dissertation]. University of Arizona; 2011. [cited 2021 May 07]. Available from: http://hdl.handle.net/10150/202716.

Council of Science Editors:

Coogan KP. Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries . [Doctoral Dissertation]. University of Arizona; 2011. Available from: http://hdl.handle.net/10150/202716


Virginia Tech

3. Chen, Zhiqian. Graph Neural Networks: Techniques and Applications.

Degree: PhD, Computer Science and Applications, 2020, Virginia Tech

 Graph data is pervasive throughout most fields, including pandemic spread network, social network, transportation roads, internet, and chemical structure. Therefore, the applications modeled by graph… (more)

Subjects/Keywords: graph neural network; graph mining; approximation theory; spectral graph; circuit deobfuscation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Z. (2020). Graph Neural Networks: Techniques and Applications. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/99848

Chicago Manual of Style (16th Edition):

Chen, Zhiqian. “Graph Neural Networks: Techniques and Applications.” 2020. Doctoral Dissertation, Virginia Tech. Accessed May 07, 2021. http://hdl.handle.net/10919/99848.

MLA Handbook (7th Edition):

Chen, Zhiqian. “Graph Neural Networks: Techniques and Applications.” 2020. Web. 07 May 2021.

Vancouver:

Chen Z. Graph Neural Networks: Techniques and Applications. [Internet] [Doctoral dissertation]. Virginia Tech; 2020. [cited 2021 May 07]. Available from: http://hdl.handle.net/10919/99848.

Council of Science Editors:

Chen Z. Graph Neural Networks: Techniques and Applications. [Doctoral Dissertation]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/99848


Brno University of Technology

4. Kollát, Samuel. Generická obfuskace na úrovni bajtkódu: Generic Obfuscation on the Bytecode Level.

Degree: 2019, Brno University of Technology

 This work contains definition of obfuscation and methods of obfuscation. It is followed by description of LLVM Project and its suitability for obfuscation on the… (more)

Subjects/Keywords: Obfuskace; deobfuskace; překladač; LLVM; reverzní inženýrství; Obfuscation; deobfuscation; compiler; LLVM; reverse engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kollát, S. (2019). Generická obfuskace na úrovni bajtkódu: Generic Obfuscation on the Bytecode Level. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54840

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kollát, Samuel. “Generická obfuskace na úrovni bajtkódu: Generic Obfuscation on the Bytecode Level.” 2019. Thesis, Brno University of Technology. Accessed May 07, 2021. http://hdl.handle.net/11012/54840.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kollát, Samuel. “Generická obfuskace na úrovni bajtkódu: Generic Obfuscation on the Bytecode Level.” 2019. Web. 07 May 2021.

Vancouver:

Kollát S. Generická obfuskace na úrovni bajtkódu: Generic Obfuscation on the Bytecode Level. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/11012/54840.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kollát S. Generická obfuskace na úrovni bajtkódu: Generic Obfuscation on the Bytecode Level. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/54840

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Salwan, Jonathan. L’usage de l’exécution symbolique pour la déobfuscation binaire en milieu industriel : Use of symbolic execution for binary deobfuscation in an industrial environment.

Degree: Docteur es, Mathématiques et informatique, 2020, Université Grenoble Alpes

Cette thèse a été faite dans un cadre industriel où les activités principales sont la rétro-ingénierie pour la recherche de vulnérabilités et la vérification de… (more)

Subjects/Keywords: Déobfuscation binaire; Analyse binaire dynamique; Exécution symbolique; Symbolic execution; Deobfuscation; Dynamic binary analysis; 004

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salwan, J. (2020). L’usage de l’exécution symbolique pour la déobfuscation binaire en milieu industriel : Use of symbolic execution for binary deobfuscation in an industrial environment. (Doctoral Dissertation). Université Grenoble Alpes. Retrieved from http://www.theses.fr/2020GRALM005

Chicago Manual of Style (16th Edition):

Salwan, Jonathan. “L’usage de l’exécution symbolique pour la déobfuscation binaire en milieu industriel : Use of symbolic execution for binary deobfuscation in an industrial environment.” 2020. Doctoral Dissertation, Université Grenoble Alpes. Accessed May 07, 2021. http://www.theses.fr/2020GRALM005.

MLA Handbook (7th Edition):

Salwan, Jonathan. “L’usage de l’exécution symbolique pour la déobfuscation binaire en milieu industriel : Use of symbolic execution for binary deobfuscation in an industrial environment.” 2020. Web. 07 May 2021.

Vancouver:

Salwan J. L’usage de l’exécution symbolique pour la déobfuscation binaire en milieu industriel : Use of symbolic execution for binary deobfuscation in an industrial environment. [Internet] [Doctoral dissertation]. Université Grenoble Alpes; 2020. [cited 2021 May 07]. Available from: http://www.theses.fr/2020GRALM005.

Council of Science Editors:

Salwan J. L’usage de l’exécution symbolique pour la déobfuscation binaire en milieu industriel : Use of symbolic execution for binary deobfuscation in an industrial environment. [Doctoral Dissertation]. Université Grenoble Alpes; 2020. Available from: http://www.theses.fr/2020GRALM005

6. Tofighi Shirazi, Matthieu. Evaluation des méthodes d'obscurcissement de binaire : Analysis of obfuscation transformations on binary code.

Degree: Docteur es, Mathématiques et informatique, 2019, Université Grenoble Alpes (ComUE)

 L'obscurcissement de code est perçu comme une stratégie de gestion de l'information visant à masquer le sens pouvant être tiré d'un logiciel, tout en préservant… (more)

Subjects/Keywords: Execution symbolique; Analyse de binaire; Apprentissage automatique; Des-Obscurcissement; Rétro-Ingiénerie; Reverse engineering; Deobfuscation; Binary analysis; Symbolic execution; Machine learning; 004

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tofighi Shirazi, M. (2019). Evaluation des méthodes d'obscurcissement de binaire : Analysis of obfuscation transformations on binary code. (Doctoral Dissertation). Université Grenoble Alpes (ComUE). Retrieved from http://www.theses.fr/2019GREAM069

Chicago Manual of Style (16th Edition):

Tofighi Shirazi, Matthieu. “Evaluation des méthodes d'obscurcissement de binaire : Analysis of obfuscation transformations on binary code.” 2019. Doctoral Dissertation, Université Grenoble Alpes (ComUE). Accessed May 07, 2021. http://www.theses.fr/2019GREAM069.

MLA Handbook (7th Edition):

Tofighi Shirazi, Matthieu. “Evaluation des méthodes d'obscurcissement de binaire : Analysis of obfuscation transformations on binary code.” 2019. Web. 07 May 2021.

Vancouver:

Tofighi Shirazi M. Evaluation des méthodes d'obscurcissement de binaire : Analysis of obfuscation transformations on binary code. [Internet] [Doctoral dissertation]. Université Grenoble Alpes (ComUE); 2019. [cited 2021 May 07]. Available from: http://www.theses.fr/2019GREAM069.

Council of Science Editors:

Tofighi Shirazi M. Evaluation des méthodes d'obscurcissement de binaire : Analysis of obfuscation transformations on binary code. [Doctoral Dissertation]. Université Grenoble Alpes (ComUE); 2019. Available from: http://www.theses.fr/2019GREAM069


Université de Lorraine

7. David, Robin. Formal Approaches for Automatic Deobfuscation and Reverse-engineering of Protected Codes : Approches formelles de désobfuscation automatique et de rétro-ingénierie de codes protégés.

Degree: Docteur es, Informatique, 2017, Université de Lorraine

L’analyse de codes malveillants est un domaine de recherche en pleine expansion de par la criticité des infrastructures touchées et les coûts impliqués de plus… (more)

Subjects/Keywords: Codes malveillants; Désobfuscation; Méthodes formelles; Exécution Symbolique; Rétro-Ingénierie; Malware; Deobfuscation; Formal Methods; Symbolic Execution; Reverse-Engineering; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

David, R. (2017). Formal Approaches for Automatic Deobfuscation and Reverse-engineering of Protected Codes : Approches formelles de désobfuscation automatique et de rétro-ingénierie de codes protégés. (Doctoral Dissertation). Université de Lorraine. Retrieved from http://www.theses.fr/2017LORR0013

Chicago Manual of Style (16th Edition):

David, Robin. “Formal Approaches for Automatic Deobfuscation and Reverse-engineering of Protected Codes : Approches formelles de désobfuscation automatique et de rétro-ingénierie de codes protégés.” 2017. Doctoral Dissertation, Université de Lorraine. Accessed May 07, 2021. http://www.theses.fr/2017LORR0013.

MLA Handbook (7th Edition):

David, Robin. “Formal Approaches for Automatic Deobfuscation and Reverse-engineering of Protected Codes : Approches formelles de désobfuscation automatique et de rétro-ingénierie de codes protégés.” 2017. Web. 07 May 2021.

Vancouver:

David R. Formal Approaches for Automatic Deobfuscation and Reverse-engineering of Protected Codes : Approches formelles de désobfuscation automatique et de rétro-ingénierie de codes protégés. [Internet] [Doctoral dissertation]. Université de Lorraine; 2017. [cited 2021 May 07]. Available from: http://www.theses.fr/2017LORR0013.

Council of Science Editors:

David R. Formal Approaches for Automatic Deobfuscation and Reverse-engineering of Protected Codes : Approches formelles de désobfuscation automatique et de rétro-ingénierie de codes protégés. [Doctoral Dissertation]. Université de Lorraine; 2017. Available from: http://www.theses.fr/2017LORR0013

.