UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0
Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-d...
Uložené v:
| Vydané v: | Sensors (Basel, Switzerland) Ročník 24; číslo 3; s. 840 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Switzerland
MDPI AG
27.01.2024
|
| Predmet: | |
| ISSN: | 1424-8220, 1424-8220 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0. |
|---|---|
| AbstractList | Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0. Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0.Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0. |
| Audience | Academic |
| Author | Choi, Seokwoo Chang, Taejoo Park, Yongsu |
| Author_xml | – sequence: 1 givenname: Seokwoo surname: Choi fullname: Choi, Seokwoo – sequence: 2 givenname: Taejoo orcidid: 0000-0003-2516-3853 surname: Chang fullname: Chang, Taejoo – sequence: 3 givenname: Yongsu orcidid: 0000-0002-7354-4434 surname: Park fullname: Park, Yongsu |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38339557$$D View this record in MEDLINE/PubMed |
| BookMark | eNpdkk1vFDEMhiNURD_gwB9AkbjQwyyeJDOT4ba0BSpVQgJWHKNk4qyyzCbbZAbUf0_aLasK5eA4fvxasX1KjkIMSMjrGhac9_A-MwEcpIBn5KQWTFSSMTh6cj8mpzlvABjnXL4gx1yWvKbpTsi0Ct-1w7D2AVvxgS7pwaWrsNPDL0zUxURbUX30E_3pg41_Mr0Kv32KYYthylQHSy9x0n5ES5dBj3fZZ_oN8zyWaAxPNNlCLOAlee70mPHVoz0jq09XPy6-VDdfP19fLG-qQdR8qlpsO0QjAWVvtOscGAt1bUTHkDOjeW-GThrLbdNYdL2RwgDTLXDnul44fkau97o26o3aJb_V6U5F7dXDQ0xrpdPkhxGVFby2tmlRdK1wqI1pJKJwWnNnpLnXerfX2qV4O2Oe1NbnAcdRB4xzVqxnDUDb9l1B3_6HbuKcSlseKAFQajWFWuyptS71fXBxSnoox-LWD2XArrRTLTvJoGeyZiXhzaPsbLZoD__5N8wCnO-BIcWcE7oDUoO6XxR1WBT-Fx4urU4 |
| Cites_doi | 10.1109/ACCESS.2020.3048848 10.1002/spe.2622 10.3390/s23167256 10.3390/s23115348 10.1145/3019612.3019791 10.1093/nsr/nwac228 10.1109/ACCESS.2020.3008900 10.3390/s23239417 10.1007/s11227-020-03270-6 10.1109/SP.2017.36 10.3390/s23167084 10.3390/s23031053 10.3390/s23021018 10.1103/PhysRevApplied.20.044011 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2024 MDPI AG 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2024 MDPI AG – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI 7X8 DOA |
| DOI | 10.3390/s24030840 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) ProQuest Hospital Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One ProQuest Central Korea Proquest Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection Medical Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition MEDLINE - Academic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | Publicly Available Content Database CrossRef MEDLINE - Academic PubMed |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: ProQuest Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_d431dd56e4764feabb58ee4faa3fb8bf A782092812 38339557 10_3390_s24030840 |
| Genre | Journal Article |
| GeographicLocations | United States |
| GeographicLocations_xml | – name: United States |
| GrantInformation_xml | – fundername: National Research Foundation of Korea grantid: RS-2023-00244071 |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M ALIPV NPM 3V. 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI 7X8 PUEGO |
| ID | FETCH-LOGICAL-c413t-6e67eeb80e89baf7f0bd011b472e32ba39bc78bd3d55def9b84b02a603ff794f3 |
| IEDL.DBID | 7X7 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001160074300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Tue Oct 14 15:08:18 EDT 2025 Fri Sep 05 13:12:13 EDT 2025 Tue Oct 07 07:37:07 EDT 2025 Tue Nov 04 18:27:38 EST 2025 Mon Jul 21 05:59:48 EDT 2025 Sat Nov 29 07:19:15 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | anti-forensics computer security code obfuscation dynamic code analysis software reverse engineering |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c413t-6e67eeb80e89baf7f0bd011b472e32ba39bc78bd3d55def9b84b02a603ff794f3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0003-2516-3853 0000-0002-7354-4434 |
| OpenAccessLink | https://www.proquest.com/docview/2924004315?pq-origsite=%requestingapplication% |
| PMID | 38339557 |
| PQID | 2924004315 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_d431dd56e4764feabb58ee4faa3fb8bf proquest_miscellaneous_2925006697 proquest_journals_2924004315 gale_infotracacademiconefile_A782092812 pubmed_primary_38339557 crossref_primary_10_3390_s24030840 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-Jan-27 |
| PublicationDateYYYYMMDD | 2024-01-27 |
| PublicationDate_xml | – month: 01 year: 2024 text: 2024-Jan-27 day: 27 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2024 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | ref_14 ref_13 ref_34 ref_11 ref_33 ref_10 ref_32 ref_30 ref_19 ref_18 ref_17 ref_15 Yin (ref_37) 2023; 10 Li (ref_38) 2023; 20 Choi (ref_35) 2021; 77 Lee (ref_31) 2021; 9 Choi (ref_12) 2020; 8 ref_25 ref_24 ref_23 ref_22 ref_21 ref_20 ref_1 ref_3 ref_2 Suk (ref_36) 2018; 48 Kim (ref_16) 2019; 35 ref_29 ref_28 ref_27 ref_26 ref_9 ref_8 ref_5 ref_4 ref_7 ref_6 |
| References_xml | – ident: ref_7 – ident: ref_28 – ident: ref_9 – ident: ref_30 – volume: 9 start-page: 7655 year: 2021 ident: ref_31 article-title: Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3048848 – volume: 48 start-page: 2331 year: 2018 ident: ref_36 article-title: UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program publication-title: Softw. Pract. Exp. doi: 10.1002/spe.2622 – ident: ref_5 – ident: ref_32 – ident: ref_3 – ident: ref_34 – ident: ref_23 doi: 10.3390/s23167256 – ident: ref_11 – ident: ref_19 doi: 10.3390/s23115348 – ident: ref_26 doi: 10.1145/3019612.3019791 – volume: 10 start-page: nwac228 year: 2023 ident: ref_37 article-title: Experimental quantum secure network with digital signatures and encryption publication-title: Natl. Sci. Rev. doi: 10.1093/nsr/nwac228 – ident: ref_14 – volume: 35 start-page: 887 year: 2019 ident: ref_16 article-title: Efficient Automatic Original Entry Point Detection publication-title: J. Inf. Sci. Eng. – ident: ref_1 – volume: 8 start-page: 127939 year: 2020 ident: ref_12 article-title: x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3008900 – ident: ref_22 doi: 10.3390/s23239417 – volume: 77 start-page: 471 year: 2021 ident: ref_35 article-title: Hybrid emulation for bypassing anti-reversing techniques and analyzing malware publication-title: J. Supercomput. doi: 10.1007/s11227-020-03270-6 – ident: ref_24 doi: 10.1109/SP.2017.36 – ident: ref_6 – ident: ref_18 doi: 10.3390/s23167084 – ident: ref_8 – ident: ref_21 doi: 10.3390/s23031053 – ident: ref_25 – ident: ref_4 – ident: ref_20 doi: 10.3390/s23021018 – ident: ref_29 – ident: ref_33 – volume: 20 start-page: 044011 year: 2023 ident: ref_38 article-title: One-time universal hashing quantum digital signatures without perfect keys publication-title: Phys. Rev. Appl. doi: 10.1103/PhysRevApplied.20.044011 – ident: ref_27 – ident: ref_2 – ident: ref_10 – ident: ref_15 – ident: ref_13 – ident: ref_17 |
| SSID | ssj0023338 |
| Score | 2.4166439 |
| Snippet | Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult.... |
| SourceID | doaj proquest gale pubmed crossref |
| SourceType | Open Website Aggregation Database Index Database |
| StartPage | 840 |
| SubjectTerms | Analysis anti-forensics code obfuscation Codes computer security Computer software industry Debugging dynamic code analysis International economic relations Linux Malware Reverse engineering Software software reverse engineering Windows operating system |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwELVQxQEOiG8CBRmExCmt8be5baEVpwoBK3qz7HgsVUVZtMmWv99xko0iOHDhGMdKnBmP5z3Hfibkbc4yYFZpaqcY1BIhbB1dg5wHdJDvAxMO8nDYhDk_txcX7sviqK-yJmyUBx4Nd5www6WkNEijZYYQo7IAMocgcrQxl9GXGbcnUxPVEsi8Rh0hgaT-uCuqc8yWGY5F9hlE-v8eiv8AmEOiObtP7k0Ika7Glj0gt6B9SO4udAMfkX7dfgsZhiItP9AVnS_pukUWfAVbimiUalmfXPb0BxLvze-Oni52tdHQJvppWEAKie61SehX6HY_8e6mXTyTH8kj9pisz06_f_xcT8cn1A1mpr7WoA1AtAysiyGbzGLCaI7ScBA8BuFiY2xMIimVILtoZWQ8aCZyxijN4gk5aDctPCM0GRcSi7xRmSPD4dYqKSCACtolHVNF3uzN6n-NKhke2UWxvZ9tX5GTYvC5QhG2HgrQ3X5yt_-XuyvyrrjLl_Drt6EJ0y4CbGcRsvKrov_nOMKWihzuPeqnuOw8d2XNLL5DVeT1fBsjqvwmCS1sdkMdVZCYMxV5OvaEuc3I54VTyjz_H9_ygtzhCJHKhA43h-Sg3-7gJbndXPeX3fbV0KFvAPpx_NU priority: 102 providerName: Directory of Open Access Journals |
| Title | UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0 |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/38339557 https://www.proquest.com/docview/2924004315 https://www.proquest.com/docview/2925006697 https://doaj.org/article/d431dd56e4764feabb58ee4faa3fb8bf |
| Volume | 24 |
| WOSCitedRecordID | wos001160074300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLdg4wAHvgeBURmExClb8Edsc0EtdILDqmpQUU6RHT-jCZSMJIUbfzvPadpVIHHhYim2FTl538_27xHyPARh0aqUqZEZpAJd2NSZEmMeyK14aTNuIPTFJtRsppdLMx8Sbu1wrHKjE3tF7esy5siPmYmnHdHcydcX39NYNSrurg4lNK6S_Vg2O_K5Wl4GXBzjrzWaEMfQ_riN2HOZjnmOHRvUQ_X_rZD_cDN7c3Ny638XepvcHBxNOl5zxh1yBaq75MYO_OA90i2qDzZA35WLV3RMt490UWEw_RUaik4tzUU6Oe_oJ4zf658tne5cjqO28vRtfw4VPN1AnNAzaFffcLSudt7JjsRRdp8sTqYf37xLhyoMaYkGrktzyBWA0xlo42xQIXMelYITigFnznLjSqWd515KD8E4LVzGbJ7xEFDYAz8ge1VdwUNCvTLWZ46VMjAMlJjWUnCwIG1ufO58Qp5t6FJcrME2CgxSIvGKLfESMokU206I-Nh9R918KQZxKzz-f-9lDkLlIoB1TmoAEazlwWkXEvIi0ruIUtw1trTDZQRcZ8TDKsYRRtAw9H4ScrghczGId1tc0jghT7fDKJhxt8VWUK_6OTI6dEYl5MGalbZr5hq_SUr16N8vf0yuM_ShYsaHqUOy1zUreEKulT-687YZ9bzet3pE9ifT2fxs1KcUsD39NcW--fvT-effNY0OtQ |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELZKQQIOvB-BAgaBOKUNfsQ2EkJb2qpVS4WgK_YW7HiMVkLJsslS8af4jYyzm-0KJG49cIxjWXb85ZsZP74h5HkIwqJVKVMjM0gFurCpMyXGPJBb8cpm3EDokk2o42M9GpkPa-RXfxcmHqvsObEjal-XcY18i5l42hHNnXw7-Z7GrFFxd7VPoTGHxSH8PMWQrXlzsIPz-4Kxvd2Td_vpIqtAWiJht2kOuQJwOgNtnA0qZM4jyJ1QDDhzlhtXKu0891J6CMZp4TJm84yHgOANHNu9QC4ij6sY7KnRWYDHMd6bqxdxbrKtJmrdZTquq6zYvC41wN8G4A-3tjNve9f_tw9zg1xbONJ0MEf-TbIG1S1ydUVe8TZph9UnG6ArysVrOqDLRzqsJjaeKKHotNNcpNvjln4eV74-bejuyuU_aitPd7pztuBpL-FCP0Iz-4Zv62qlTbYpNrM7ZHguw75L1qu6gvuEemWszxwrZWAYCDKtpeBgQdrc-Nz5hDzrcVBM5mIiBQZhESzFEiwJ2Y4IWVaI-t9dQT39WizopPA4397LHITKRQDrnNQAIljLg9MuJORlxFcRWaqd2tIuLltgP6PeVzGIMomGoXeXkI0eVsWCvpriDFMJebp8jcQTd5NsBfWsqyOjw2pUQu7NobvsM9c4JinVg383_oRc3j95f1QcHRwfPiRXGPqLcXWLqQ2y3k5n8IhcKn-042b6uPvPKPly3vj9DWQwZ9k |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwEB4tXYTgwPsRWMAgEKdsgx9JjIRQl25FtVBVsBXLKdixjSqhpDQpK_4av45xmoYKJG574Bjbsuz488w39ngG4IlzXKFWyUMpIhtypLChljnaPDZW_LmKmLSuSTaRTCbpyYmc7sDPzVsY71a5kYmNoDZl7s_I-1R6b0dUd6LvWreI6XD0avEt9Bmk_E3rJp3GGiJH9scpmm_Vy_EQ1_oppaPD49dvwjbDQJij8K7D2MaJtTqNbCq1comLtEHAa55Qy6hWTOo8SbVhRghjndQp1xFVccScQyA7hv2eg12k5Jz2YHc6fjf91Jl7DK2_dSwjxmTUr3zkuyj1pyxbGrBJFPC3OviD5DbKbnTlf_5NV-FyS7HJYL0nrsGOLa7Dpa3AizegnhUflLNNUcxfkAHpPsmsWCjva0KQzpOYhwfzmnycF6Y8rcjh1rNAogpDho0HrjVkE9yFvLfV6ivWlsVWn3Sf70c3YXYm074FvaIs7B0gJpHKRJrmwlE0EWmaCs6sskLF0sTaBPB4g4lssQ4zkqF55oGTdcAJ4MCjpWvgI4M3BeXyS9YKmszg2hsjYsuTmDurtBaptdwpxZxOtQvgmcda5uVXvVS5ap9h4Dh9JLBs4AMoSoq8L4C9DcSyVrBV2W98BfCoq0aR5O-ZVGHLVdNGeCorkwBur2HcjZmlOCchkrv_7vwhXEDYZm_Hk6N7cJEikfTHXjTZg169XNn7cD7_Xs-r5YN20xH4fNYA_gXUtXIo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=UnSafengine64%3A+A+Safengine+Unpacker+for+64-Bit+Windows+Environments+and+Detailed+Analysis+Results+on+Safengine+2.4.0&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Choi%2C+Seokwoo&rft.au=Chang%2C+Taejoo&rft.au=Park%2C+Yongsu&rft.date=2024-01-27&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=24&rft.issue=3&rft.spage=840&rft_id=info:doi/10.3390%2Fs24030840&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s24030840 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |