UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0

Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-d...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Sensors (Basel, Switzerland) Ročník 24; číslo 3; s. 840
Hlavní autori: Choi, Seokwoo, Chang, Taejoo, Park, Yongsu
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Switzerland MDPI AG 27.01.2024
Predmet:
ISSN:1424-8220, 1424-8220
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0.
AbstractList Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0.
Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0.Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-reversing techniques, including code encryption, anti-debugging, and code virtualization. In this study, we present UnSafengine64: a Safengine unpacker for 64-bit Windows. UnSafengine64 can correctly unpack packed executables using Safengine, which is considered one of the most complex commercial packers in Windows environments; to the best of our knowledge, there have been no published analysis results. UnSafengine64 was developed as a plug-in for Pin, which is one of the most widely used dynamic analysis tools for Microsoft Windows. In addition, we utilized Detect It Easy (DIE), IDA Pro, x64Dbg, and x64Unpack as auxiliary tools for deep analysis. Using UnSafengine64, we can analyze obfuscated calls for major application programming interface (API) functions or conduct fine-grained analyses at the instruction level. Furthermore, UnSafengine64 detects anti-debugging code chunks, captures a memory dump of the target process, and unpacks packed files. To verify the effectiveness of our scheme, experiments were conducted using Safengine 2.4.0. The experimental results show that UnSafengine64 correctly executes packed executable files and successfully produces an unpacked version. Based on this, we provided detailed analysis results for the obfuscated executable file generated using Safengine 2.4.0.
Audience Academic
Author Choi, Seokwoo
Chang, Taejoo
Park, Yongsu
Author_xml – sequence: 1
  givenname: Seokwoo
  surname: Choi
  fullname: Choi, Seokwoo
– sequence: 2
  givenname: Taejoo
  orcidid: 0000-0003-2516-3853
  surname: Chang
  fullname: Chang, Taejoo
– sequence: 3
  givenname: Yongsu
  orcidid: 0000-0002-7354-4434
  surname: Park
  fullname: Park, Yongsu
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38339557$$D View this record in MEDLINE/PubMed
BookMark eNpdkk1vFDEMhiNURD_gwB9AkbjQwyyeJDOT4ba0BSpVQgJWHKNk4qyyzCbbZAbUf0_aLasK5eA4fvxasX1KjkIMSMjrGhac9_A-MwEcpIBn5KQWTFSSMTh6cj8mpzlvABjnXL4gx1yWvKbpTsi0Ct-1w7D2AVvxgS7pwaWrsNPDL0zUxURbUX30E_3pg41_Mr0Kv32KYYthylQHSy9x0n5ES5dBj3fZZ_oN8zyWaAxPNNlCLOAlee70mPHVoz0jq09XPy6-VDdfP19fLG-qQdR8qlpsO0QjAWVvtOscGAt1bUTHkDOjeW-GThrLbdNYdL2RwgDTLXDnul44fkau97o26o3aJb_V6U5F7dXDQ0xrpdPkhxGVFby2tmlRdK1wqI1pJKJwWnNnpLnXerfX2qV4O2Oe1NbnAcdRB4xzVqxnDUDb9l1B3_6HbuKcSlseKAFQajWFWuyptS71fXBxSnoox-LWD2XArrRTLTvJoGeyZiXhzaPsbLZoD__5N8wCnO-BIcWcE7oDUoO6XxR1WBT-Fx4urU4
Cites_doi 10.1109/ACCESS.2020.3048848
10.1002/spe.2622
10.3390/s23167256
10.3390/s23115348
10.1145/3019612.3019791
10.1093/nsr/nwac228
10.1109/ACCESS.2020.3008900
10.3390/s23239417
10.1007/s11227-020-03270-6
10.1109/SP.2017.36
10.3390/s23167084
10.3390/s23031053
10.3390/s23021018
10.1103/PhysRevApplied.20.044011
ContentType Journal Article
Copyright COPYRIGHT 2024 MDPI AG
2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2024 MDPI AG
– notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
7X8
DOA
DOI 10.3390/s24030840
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
ProQuest Hospital Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One
ProQuest Central Korea
Proquest Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
MEDLINE - Academic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList Publicly Available Content Database
CrossRef

MEDLINE - Academic

PubMed
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: PIMPY
  name: ProQuest Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_d431dd56e4764feabb58ee4faa3fb8bf
A782092812
38339557
10_3390_s24030840
Genre Journal Article
GeographicLocations United States
GeographicLocations_xml – name: United States
GrantInformation_xml – fundername: National Research Foundation of Korea
  grantid: RS-2023-00244071
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
ALIPV
NPM
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
7X8
PUEGO
ID FETCH-LOGICAL-c413t-6e67eeb80e89baf7f0bd011b472e32ba39bc78bd3d55def9b84b02a603ff794f3
IEDL.DBID 7X7
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001160074300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Tue Oct 14 15:08:18 EDT 2025
Fri Sep 05 13:12:13 EDT 2025
Tue Oct 07 07:37:07 EDT 2025
Tue Nov 04 18:27:38 EST 2025
Mon Jul 21 05:59:48 EDT 2025
Sat Nov 29 07:19:15 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords anti-forensics
computer security
code obfuscation
dynamic code analysis
software reverse engineering
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c413t-6e67eeb80e89baf7f0bd011b472e32ba39bc78bd3d55def9b84b02a603ff794f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0003-2516-3853
0000-0002-7354-4434
OpenAccessLink https://www.proquest.com/docview/2924004315?pq-origsite=%requestingapplication%
PMID 38339557
PQID 2924004315
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_d431dd56e4764feabb58ee4faa3fb8bf
proquest_miscellaneous_2925006697
proquest_journals_2924004315
gale_infotracacademiconefile_A782092812
pubmed_primary_38339557
crossref_primary_10_3390_s24030840
PublicationCentury 2000
PublicationDate 2024-Jan-27
PublicationDateYYYYMMDD 2024-01-27
PublicationDate_xml – month: 01
  year: 2024
  text: 2024-Jan-27
  day: 27
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2024
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_14
ref_13
ref_34
ref_11
ref_33
ref_10
ref_32
ref_30
ref_19
ref_18
ref_17
ref_15
Yin (ref_37) 2023; 10
Li (ref_38) 2023; 20
Choi (ref_35) 2021; 77
Lee (ref_31) 2021; 9
Choi (ref_12) 2020; 8
ref_25
ref_24
ref_23
ref_22
ref_21
ref_20
ref_1
ref_3
ref_2
Suk (ref_36) 2018; 48
Kim (ref_16) 2019; 35
ref_29
ref_28
ref_27
ref_26
ref_9
ref_8
ref_5
ref_4
ref_7
ref_6
References_xml – ident: ref_7
– ident: ref_28
– ident: ref_9
– ident: ref_30
– volume: 9
  start-page: 7655
  year: 2021
  ident: ref_31
  article-title: Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3048848
– volume: 48
  start-page: 2331
  year: 2018
  ident: ref_36
  article-title: UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
  publication-title: Softw. Pract. Exp.
  doi: 10.1002/spe.2622
– ident: ref_5
– ident: ref_32
– ident: ref_3
– ident: ref_34
– ident: ref_23
  doi: 10.3390/s23167256
– ident: ref_11
– ident: ref_19
  doi: 10.3390/s23115348
– ident: ref_26
  doi: 10.1145/3019612.3019791
– volume: 10
  start-page: nwac228
  year: 2023
  ident: ref_37
  article-title: Experimental quantum secure network with digital signatures and encryption
  publication-title: Natl. Sci. Rev.
  doi: 10.1093/nsr/nwac228
– ident: ref_14
– volume: 35
  start-page: 887
  year: 2019
  ident: ref_16
  article-title: Efficient Automatic Original Entry Point Detection
  publication-title: J. Inf. Sci. Eng.
– ident: ref_1
– volume: 8
  start-page: 127939
  year: 2020
  ident: ref_12
  article-title: x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3008900
– ident: ref_22
  doi: 10.3390/s23239417
– volume: 77
  start-page: 471
  year: 2021
  ident: ref_35
  article-title: Hybrid emulation for bypassing anti-reversing techniques and analyzing malware
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-020-03270-6
– ident: ref_24
  doi: 10.1109/SP.2017.36
– ident: ref_6
– ident: ref_18
  doi: 10.3390/s23167084
– ident: ref_8
– ident: ref_21
  doi: 10.3390/s23031053
– ident: ref_25
– ident: ref_4
– ident: ref_20
  doi: 10.3390/s23021018
– ident: ref_29
– ident: ref_33
– volume: 20
  start-page: 044011
  year: 2023
  ident: ref_38
  article-title: One-time universal hashing quantum digital signatures without perfect keys
  publication-title: Phys. Rev. Appl.
  doi: 10.1103/PhysRevApplied.20.044011
– ident: ref_27
– ident: ref_2
– ident: ref_10
– ident: ref_15
– ident: ref_13
– ident: ref_17
SSID ssj0023338
Score 2.4166439
Snippet Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult....
SourceID doaj
proquest
gale
pubmed
crossref
SourceType Open Website
Aggregation Database
Index Database
StartPage 840
SubjectTerms Analysis
anti-forensics
code obfuscation
Codes
computer security
Computer software industry
Debugging
dynamic code analysis
International economic relations
Linux
Malware
Reverse engineering
Software
software reverse engineering
Windows operating system
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwELVQxQEOiG8CBRmExCmt8be5baEVpwoBK3qz7HgsVUVZtMmWv99xko0iOHDhGMdKnBmP5z3Hfibkbc4yYFZpaqcY1BIhbB1dg5wHdJDvAxMO8nDYhDk_txcX7sviqK-yJmyUBx4Nd5www6WkNEijZYYQo7IAMocgcrQxl9GXGbcnUxPVEsi8Rh0hgaT-uCuqc8yWGY5F9hlE-v8eiv8AmEOiObtP7k0Ika7Glj0gt6B9SO4udAMfkX7dfgsZhiItP9AVnS_pukUWfAVbimiUalmfXPb0BxLvze-Oni52tdHQJvppWEAKie61SehX6HY_8e6mXTyTH8kj9pisz06_f_xcT8cn1A1mpr7WoA1AtAysiyGbzGLCaI7ScBA8BuFiY2xMIimVILtoZWQ8aCZyxijN4gk5aDctPCM0GRcSi7xRmSPD4dYqKSCACtolHVNF3uzN6n-NKhke2UWxvZ9tX5GTYvC5QhG2HgrQ3X5yt_-XuyvyrrjLl_Drt6EJ0y4CbGcRsvKrov_nOMKWihzuPeqnuOw8d2XNLL5DVeT1fBsjqvwmCS1sdkMdVZCYMxV5OvaEuc3I54VTyjz_H9_ygtzhCJHKhA43h-Sg3-7gJbndXPeX3fbV0KFvAPpx_NU
  priority: 102
  providerName: Directory of Open Access Journals
Title UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0
URI https://www.ncbi.nlm.nih.gov/pubmed/38339557
https://www.proquest.com/docview/2924004315
https://www.proquest.com/docview/2925006697
https://doaj.org/article/d431dd56e4764feabb58ee4faa3fb8bf
Volume 24
WOSCitedRecordID wos001160074300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLdg4wAHvgeBURmExClb8Edsc0EtdILDqmpQUU6RHT-jCZSMJIUbfzvPadpVIHHhYim2FTl538_27xHyPARh0aqUqZEZpAJd2NSZEmMeyK14aTNuIPTFJtRsppdLMx8Sbu1wrHKjE3tF7esy5siPmYmnHdHcydcX39NYNSrurg4lNK6S_Vg2O_K5Wl4GXBzjrzWaEMfQ_riN2HOZjnmOHRvUQ_X_rZD_cDN7c3Ny638XepvcHBxNOl5zxh1yBaq75MYO_OA90i2qDzZA35WLV3RMt490UWEw_RUaik4tzUU6Oe_oJ4zf658tne5cjqO28vRtfw4VPN1AnNAzaFffcLSudt7JjsRRdp8sTqYf37xLhyoMaYkGrktzyBWA0xlo42xQIXMelYITigFnznLjSqWd515KD8E4LVzGbJ7xEFDYAz8ge1VdwUNCvTLWZ46VMjAMlJjWUnCwIG1ufO58Qp5t6FJcrME2CgxSIvGKLfESMokU206I-Nh9R918KQZxKzz-f-9lDkLlIoB1TmoAEazlwWkXEvIi0ruIUtw1trTDZQRcZ8TDKsYRRtAw9H4ScrghczGId1tc0jghT7fDKJhxt8VWUK_6OTI6dEYl5MGalbZr5hq_SUr16N8vf0yuM_ShYsaHqUOy1zUreEKulT-687YZ9bzet3pE9ifT2fxs1KcUsD39NcW--fvT-effNY0OtQ
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELZKQQIOvB-BAgaBOKUNfsQ2EkJb2qpVS4WgK_YW7HiMVkLJsslS8af4jYyzm-0KJG49cIxjWXb85ZsZP74h5HkIwqJVKVMjM0gFurCpMyXGPJBb8cpm3EDokk2o42M9GpkPa-RXfxcmHqvsObEjal-XcY18i5l42hHNnXw7-Z7GrFFxd7VPoTGHxSH8PMWQrXlzsIPz-4Kxvd2Td_vpIqtAWiJht2kOuQJwOgNtnA0qZM4jyJ1QDDhzlhtXKu0891J6CMZp4TJm84yHgOANHNu9QC4ij6sY7KnRWYDHMd6bqxdxbrKtJmrdZTquq6zYvC41wN8G4A-3tjNve9f_tw9zg1xbONJ0MEf-TbIG1S1ydUVe8TZph9UnG6ArysVrOqDLRzqsJjaeKKHotNNcpNvjln4eV74-bejuyuU_aitPd7pztuBpL-FCP0Iz-4Zv62qlTbYpNrM7ZHguw75L1qu6gvuEemWszxwrZWAYCDKtpeBgQdrc-Nz5hDzrcVBM5mIiBQZhESzFEiwJ2Y4IWVaI-t9dQT39WizopPA4397LHITKRQDrnNQAIljLg9MuJORlxFcRWaqd2tIuLltgP6PeVzGIMomGoXeXkI0eVsWCvpriDFMJebp8jcQTd5NsBfWsqyOjw2pUQu7NobvsM9c4JinVg383_oRc3j95f1QcHRwfPiRXGPqLcXWLqQ2y3k5n8IhcKn-042b6uPvPKPly3vj9DWQwZ9k
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwEB4tXYTgwPsRWMAgEKdsgx9JjIRQl25FtVBVsBXLKdixjSqhpDQpK_4av45xmoYKJG574Bjbsuz488w39ngG4IlzXKFWyUMpIhtypLChljnaPDZW_LmKmLSuSTaRTCbpyYmc7sDPzVsY71a5kYmNoDZl7s_I-1R6b0dUd6LvWreI6XD0avEt9Bmk_E3rJp3GGiJH9scpmm_Vy_EQ1_oppaPD49dvwjbDQJij8K7D2MaJtTqNbCq1comLtEHAa55Qy6hWTOo8SbVhRghjndQp1xFVccScQyA7hv2eg12k5Jz2YHc6fjf91Jl7DK2_dSwjxmTUr3zkuyj1pyxbGrBJFPC3OviD5DbKbnTlf_5NV-FyS7HJYL0nrsGOLa7Dpa3AizegnhUflLNNUcxfkAHpPsmsWCjva0KQzpOYhwfzmnycF6Y8rcjh1rNAogpDho0HrjVkE9yFvLfV6ivWlsVWn3Sf70c3YXYm074FvaIs7B0gJpHKRJrmwlE0EWmaCs6sskLF0sTaBPB4g4lssQ4zkqF55oGTdcAJ4MCjpWvgI4M3BeXyS9YKmszg2hsjYsuTmDurtBaptdwpxZxOtQvgmcda5uVXvVS5ap9h4Dh9JLBs4AMoSoq8L4C9DcSyVrBV2W98BfCoq0aR5O-ZVGHLVdNGeCorkwBur2HcjZmlOCchkrv_7vwhXEDYZm_Hk6N7cJEikfTHXjTZg169XNn7cD7_Xs-r5YN20xH4fNYA_gXUtXIo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=UnSafengine64%3A+A+Safengine+Unpacker+for+64-Bit+Windows+Environments+and+Detailed+Analysis+Results+on+Safengine+2.4.0&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Choi%2C+Seokwoo&rft.au=Chang%2C+Taejoo&rft.au=Park%2C+Yongsu&rft.date=2024-01-27&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=24&rft.issue=3&rft.spage=840&rft_id=info:doi/10.3390%2Fs24030840&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s24030840
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon