earticle

논문검색

Evading Anti-debugging Techniques with Binary Substitution

초록

영어

Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using various ways, such as execution time delay, debugger detection techniques and so on. In this paper, we propose a Evading Anti-debugging techniques method that can avoid anti-debugging techniques in binary files, and showed several samples of anti-debugging applications and how to detect and patch anti-debugging techniques in common utilities or malicious code effectively.

목차

Abstract
 1. Introduction
 2. Background
  2.1. Assembly Instruction
  2.2. Anti-debugging Techniques
 3. Related Work
 4. Our Proposed Method
  4.1. Evading Anti-anti-debugging Techniques Method Overview
  4.2. Rule Composition
  4.3. Anti-debugging Detection Algorithm
 5. Experiments
  5.1. Anti-debugging Patch Experiment
  5.2. Patch Verification Experiment
 6. Conclusion
 Acknowledgements
 References

저자정보

  • JaeKeun Lee Department of Computer and Software, Hanyang University, Seoul, Korea
  • BooJoong Kang Department of Computer and Software, Hanyang University, Seoul, Korea
  • Eul Gyu Im Department of Computer and Software, Hanyang University, Seoul, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.