
REFERENCES
Alglave, J., Kashyap, M., and Tofte, M. (2010). Compo-
sitional reasoning for shared-variable concurrent pro-
grams. ACM Transactions on Programming Lan-
guages and Systems (TOPLAS), 32(5):1–53.
Anckaert, B., Madou, M., and De Bosschere, K. (2007). A
model for self-modifying code. In Camenisch, J. L.,
Collberg, C. S., Johnson, N. F., and Sallee, P., editors,
Information Hiding, pages 232–248, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A.,
Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P.
(2014). Flowdroid: Precise context, flow, field, object-
sensitive and lifecycle-aware taint analysis for android
apps. Acm Sigplan Notices, 49(6):259–269.
Biondo, A., Conti, M., and Lain, D. (2018). Back to the
epilogue: Evading control flow guard via unaligned
targets. In Ndss.
Blazy, S., Laporte, V., and Pichardie, D. (2016). Verified ab-
stract interpretation techniques for disassembling low-
level self-modifying code. Journal of Automated Rea-
soning, 56:283–308.
Bruschi, D., Martignoni, L., and Monga, M. (2006). Detect-
ing self-mutating malware using control-flow graph
matching. In Detection of Intrusions and Malware
& Vulnerability Assessment: Third International Con-
ference, DIMVA 2006, Berlin, Germany, July 13-14,
2006. Proceedings 3, pages 129–143. Springer.
Chen, Y., Zhang, D., Wang, R., Qiao, R., Azab, A. M., Lu,
L., Vijayakumar, H., and Shen, W. (2017). Norax:
Enabling execute-only memory for cots binaries on
aarch64. In 2017 IEEE Symposium on Security and
Privacy (SP), pages 304–319. IEEE.
Dawei, S., Delong, L., and Zhibin, Y. (2018). Dynamic self-
modifying code detection based on backward analysis.
In Proceedings of the 2018 10th International Confer-
ence on Computer and Automation Engineering, IC-
CAE 2018, page 199–204, New York, NY, USA. As-
sociation for Computing Machinery.
Enderman (2022). Malwarecollection. https://github.com/
xcp3r/MalwareCollection.
Guizani, W., Marion, J.-Y., and Reynaud-Plantey, D.
(2009). Server-side dynamic code analysis. In 2009
4th International Conference on Malicious and Un-
wanted Software (MALWARE), pages 55–62.
Liu, Y., Xu, Z., Fan, M., Hao, Y., Chen, K., Chen, H., Cai,
Y., Yang, Z., and Liu, T. (2022). Concspectre: Be
aware of forthcoming malware hidden in concurrent
programs. IEEE Transactions on Reliability, 71:1–10.
Maisuradze, G., Petrenko, A. S., Bala, A., and Lie, D.
(2010). Threadsanitizer: finding data races in native
code. Proceedings of the ACM SIGPLAN Conference
on Programming Language Design and Implementa-
tion, pages 89–100.
Messahel, W. and Touili, T. (2024). Reachability analysis
of concurrent self-modifying code. In 28th Interna-
tional Conference on Engineering of Complex Com-
puter Systems (ICECCS).
Nethercote, N., Seward, J., and Seward, J. (2007). Valgrind:
A framework for heavyweight dynamic binary instru-
mentation. In Proceedings of the 2007 International
Symposium on Dynamic Languages, pages 89–100.
Perekalin, A. (2017). Bad rabbit: A new ransomware epi-
demic is on the rise. https://www.kaspersky.com/blog/
bad-rabbit-ransomware/19887/.
Schwartz, E. J., Cohen, C. F., Duggan, M., Gennari, J.,
Havrilla, J. S., and Hines, C. (2018). Using logic pro-
gramming to recover c++ classes and methods from
compiled executables. In Proceedings of the 2018
ACM SIGSAC Conference on Computer and Commu-
nications Security, pages 426–441.
Shoshitaishvili, Y., Wang, R., Salls, C., Stephens, N.,
Polino, M., Dutcher, A., Grosen, J., Feng, S., Hauser,
C., Kruegel, C., and Vigna, G. (2016). SoK: (State
of) The Art of War: Offensive Techniques in Binary
Analysis. In IEEE Symposium on Security and Pri-
vacy.
Studer, A., Abd El-MAwgood, A. M., and Akshay Krish-
nan, R. (2023). The official radare2 book. https:
//book.rada.re/credits/credits.html.
Touili, T. and Ye, X. (2017). Reachability analysis of
self modifying code. In 22nd International Confer-
ence on Engineering of Complex Computer Systems
(ICECCS).
Touili, T. and Ye, X. (2019). Ltl model checking of self
modifying code. In 2019 24th International Confer-
ence on Engineering of Complex Computer Systems
(ICECCS).
Ugarte-Pedrero, X., Balzarotti, D., Santos, I., and Bringas,
P. G. (2015). Sok: Deep packer inspection: A longitu-
dinal study of the complexity of run-time packers. In
2015 IEEE Symposium on Security and Privacy, pages
659–673.
Wang, R., Shoshitaishvili, Y., Bianchi, A., Machiry, A.,
Grosen, J., Grosen, P., Kruegel, C., and Vigna, G.
(2017). Ramblr: Making reassembly great again. In
NDSS.
Wu, W., Chen, Y., Xing, X., and Zou, W. (2019). Kepler:
Facilitating control-flow hijacking primitive evalua-
tion for linux kernel vulnerabilities. In USENIX Se-
curity Symposium, pages 1187–1204.
Zhang, X., Zhang, Y., Mo, Q., Xia, H., Yang, Z., Yang, M.,
Wang, X., Lu, L., and Duan, H. (2018). An empiri-
cal study of web resource manipulation in real-world
mobile applications. In 27th {USENIX} Security Sym-
posium ({USENIX} Security 18), pages 1183–1198.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
182