Evading anti-debugging techniques with binary substitution
- Title
- Evading anti-debugging techniques with binary substitution
- Author
- 임을규
- Keywords
- Malware Analysis; Anti-debugging detection; Static Analysis; Dynamic Analysis
- Issue Date
- 2014-01
- Publisher
- 보안공학연구지원센터(IJSIA)
- Citation
- International Journal of Security and Its Applications, 01/30/2014, Vol. 8, Issue 1, p. 183-192
- Abstract
- Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using various ways, such as execution time delay, debugger detection techniques and so on. In this paper, we propose a Evading Anti-debugging techniques method that can avoid anti-debugging techniques in binary files, and showed several samples of anti-debugging applications and how to detect and patch anti-debugging techniques in common utilities or malicious code effectively.
- URI
- http://www.earticle.net/Article.aspx?sn=218100http://hdl.handle.net/20.500.11754/47148
- ISSN
- 1738-9976
- DOI
- 10.14257/ljsia.2014.8.1.17
- Appears in Collections:
- COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
- Files in This Item:
There are no files associated with this item.
- Export
- RIS (EndNote)
- XLS (Excel)
- XML