[HTML][HTML] Bypassing Heaven's Gate Technique Using Black-Box Testing
In recent years, the number and sophistication of malware attacks on computer systems
have increased significantly. One technique employed by malware authors to evade …
have increased significantly. One technique employed by malware authors to evade …
Detection Techniques for DBI Environment in Windows
S Park, Y Park - Electronics, 2024 - mdpi.com
Dynamic binary instrumentation (DBI) is a technique that enables the monitoring and
analysis of software, providing enhanced performance compared to other analysis tools …
analysis of software, providing enhanced performance compared to other analysis tools …
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
T Apostolopoulos, V Katos, KKR Choo… - Future Generation …, 2021 - Elsevier
Dynamic malware analysis involves the debugging of the associated binary files and the
monitoring of changes in sandboxed environments. This allows the investigator to …
monitoring of changes in sandboxed environments. This allows the investigator to …
Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …
based on social engineering to advanced persistent threats. Recent research and …
Measuring and defeating anti-instrumentation-equipped malware
M Polino, A Continella, S Mariani, S D'Alessio… - Detection of Intrusions …, 2017 - Springer
Malware authors constantly develop new techniques in order to evade analysis systems.
Previous works addressed attempts to evade analysis by means of anti-sandboxing and anti …
Previous works addressed attempts to evade analysis by means of anti-sandboxing and anti …
Down to the bare metal: Using processor features for binary analysis
A detailed understanding of the behavior of exploits and malicious software is necessary to
obtain a comprehensive overview of vulnerabilities in operating systems or client …
obtain a comprehensive overview of vulnerabilities in operating systems or client …
Reducing the attack surface of dynamic binary instrumentation frameworks
AS Filho, RJ Rodríguez, EL Feitosa - Developments and Advances in …, 2020 - Springer
Malicious applications pose as one of the most relevant issues in today's technology
scenario, being considered the root of many Internet security threats. In part, this owes the …
scenario, being considered the root of many Internet security threats. In part, this owes the …
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization
The ability to trap the execution of a binary program at desired instructions is essential in
many security scenarios such as malware analysis and attack provenance. However, an …
many security scenarios such as malware analysis and attack provenance. However, an …
Evasion and countermeasures techniques to detect dynamic binary instrumentation frameworks
AS Filho, RJ Rodríguez, EL Feitosa - Digital Threats: Research and …, 2022 - dl.acm.org
Dynamic Binary Instrumentation (DBI) is a dynamic analysis technique that allows arbitrary
code to be executed when a program is running. DBI frameworks have started to be used to …
code to be executed when a program is running. DBI frameworks have started to be used to …
Dynamic binary instrumentation-based framework for malware defense
Malware is at the root of a large number of information security breaches. Despite
widespread effort devoted to combating malware, current techniques have proven to be …
widespread effort devoted to combating malware, current techniques have proven to be …