[HTML][HTML] Bypassing Heaven's Gate Technique Using Black-Box Testing

SJ Hwang, A Utaliyeva, JS Kim, YH Choi - Sensors, 2023 - mdpi.com
In recent years, the number and sophistication of malware attacks on computer systems
have increased significantly. One technique employed by malware authors to evade …

Detection Techniques for DBI Environment in Windows

S Park, Y Park - Electronics, 2024 - mdpi.com
Dynamic binary instrumentation (DBI) is a technique that enables the monitoring and
analysis of software, providing enhanced performance compared to other analysis tools …

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks

T Apostolopoulos, V Katos, KKR Choo… - Future Generation …, 2021 - Elsevier
Dynamic malware analysis involves the debugging of the associated binary files and the
monitoring of changes in sandboxed environments. This allows the investigator to …

Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms

M Botacin, PLD Geus, A Grégio - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …

Measuring and defeating anti-instrumentation-equipped malware

M Polino, A Continella, S Mariani, S D'Alessio… - Detection of Intrusions …, 2017 - Springer
Malware authors constantly develop new techniques in order to evade analysis systems.
Previous works addressed attempts to evade analysis by means of anti-sandboxing and anti …

Down to the bare metal: Using processor features for binary analysis

C Willems, R Hund, A Fobian, D Felsch, T Holz… - Proceedings of the 28th …, 2012 - dl.acm.org
A detailed understanding of the behavior of exploits and malicious software is necessary to
obtain a comprehensive overview of vulnerabilities in operating systems or client …

Reducing the attack surface of dynamic binary instrumentation frameworks

AS Filho, RJ Rodríguez, EL Feitosa - Developments and Advances in …, 2020 - Springer
Malicious applications pose as one of the most relevant issues in today's technology
scenario, being considered the root of many Internet security threats. In part, this owes the …

Spider: Stealthy binary program instrumentation and debugging via hardware virtualization

Z Deng, X Zhang, D Xu - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
The ability to trap the execution of a binary program at desired instructions is essential in
many security scenarios such as malware analysis and attack provenance. However, an …

Evasion and countermeasures techniques to detect dynamic binary instrumentation frameworks

AS Filho, RJ Rodríguez, EL Feitosa - Digital Threats: Research and …, 2022 - dl.acm.org
Dynamic Binary Instrumentation (DBI) is a dynamic analysis technique that allows arbitrary
code to be executed when a program is running. DBI frameworks have started to be used to …

Dynamic binary instrumentation-based framework for malware defense

N Aaraj, A Raghunathan, NK Jha - … , DIMVA 2008, Paris, France, July 10 …, 2008 - Springer
Malware is at the root of a large number of information security breaches. Despite
widespread effort devoted to combating malware, current techniques have proven to be …