Evading anti-debugging techniques with binary substitution
- Authors
- Lee, Jae Keun; Kang, Boo Joong; Im, Eul Gyu
- Issue Date
- Jan-2014
- Publisher
- Science and Engineering Research Support Society
- Keywords
- Anti-debugging detection; Dynamic analysis; Malware analysis; Static analysis
- Citation
- International Journal of Security and its Applications, v.8, no.1, pp.183 - 192
- Indexed
- SCOPUS
- Journal Title
- International Journal of Security and its Applications
- Volume
- 8
- Number
- 1
- Start Page
- 183
- End Page
- 192
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/160860
- DOI
- 10.14257/ijsia.2014.8.1.17
- ISSN
- 1738-9976
- Abstract
- Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using various ways, such as execution time delay, debugger detection techniques and so on. In this paper, we propose a Evading Anti-debugging techniques method that can avoid anti-debugging techniques in binary files, and showed several samples of anti-debugging applications and how to detect and patch anti-debugging techniques in common utilities or malicious code effectively.
- Files in This Item
-
Go to Link
- Appears in
Collections - 서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/160860)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.