279 0

Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments

Title
Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments
Author
박용수
Keywords
computer hacking; computer security; debugging; reverse engineering; software protection
Issue Date
2019-05
Publisher
UNIV SUCEAVA
Citation
ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v. 19, NO 2, Page. 23-28
Abstract
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult. Unlike most of the previous work that relies on debugger-plugins for neutralizing anti-debugging techniques, we focus on the Pin, which is one of the most widely used DBI (Dynamic Binary Instrumentation) tools in 80x86 environments. In this paper, we present an automatic anti-debugging detection/bypassing scheme using the Pin. In order to evaluate the effectiveness of our algorithm, we conducted experiments on 17 most widely used (commercial) protectors, which results in bypassing all anti-debugging techniques automatically. Particularly, our experiment includes Safengine, which is one of the most complex commercial protectors and, to the best of our knowledge, it has not been successfully analyzed by academic researchers up to now. Also, experimental results show that the proposed scheme performs better than the most recent work, Apate.
URI
http://www.aece.ro/abstractplus.php?year=2019&number=2&article=3https://repository.hanyang.ac.kr/handle/20.500.11754/151148
ISSN
1582-7445; 1844-7600
DOI
10.4316/AECE.2019.02003
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE