Follow
Jeremy Blackthorne
Jeremy Blackthorne
Verified email at rpi.edu - Homepage
Title
Cited by
Cited by
Year
{AVLeak}: Fingerprinting Antivirus Emulators through {Black-Box} Testing
J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
552016
Environmental authentication in malware
J Blackthorne, B Kaiser, B Fuller, B Yener
Progress in Cryptology–LATINCRYPT 2017: 5th International Conference on …, 2019
72019
A formal framework for environmentally sensitive malware
J Blackthorne, B Kaiser, B Yener
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
62016
Anti-Malware Sandbox Games
S Sikdar, S Ruan, Q Han, P Pitimanaaree, J Blackthorne, B Yener, L Xia
arXiv preprint arXiv:2202.13520, 2022
22022
Flowtables: program skeletal inversion for defeat of interprocedural analysis with unique metamorphism
L Jones, R Whelan, J Blackthorne, G Baker
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
22015
Reverse Engineering Anti-Virus Emulators through Black-box Analysis
J Blackthorne, B Yener
Tech. rep., Computer Science Department, Rensselaer Polytechnic Institute, 2015
22015
Out-of-Order Execution as a Cross-VM Side-Channel and Other Applications
S d'Antoine, J Blackthorne, B Yener
Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 1-11, 2017
2017
Obfuscation through the observer-effect: Thinking outside the virtual black-box
JL Blackthorne
Rensselaer Polytechnic Institute, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–8