Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Evading anti-debugging techniques with binary substitution

Authors
Lee, Jae KeunKang, Boo JoongIm, Eul Gyu
Issue Date
Jan-2014
Publisher
Science and Engineering Research Support Society
Keywords
Anti-debugging detection; Dynamic analysis; Malware analysis; Static analysis
Citation
International Journal of Security and its Applications, v.8, no.1, pp.183 - 192
Indexed
SCOPUS
Journal Title
International Journal of Security and its Applications
Volume
8
Number
1
Start Page
183
End Page
192
URI
https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/160860
DOI
10.14257/ijsia.2014.8.1.17
ISSN
1738-9976
Abstract
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using various ways, such as execution time delay, debugger detection techniques and so on. In this paper, we propose a Evading Anti-debugging techniques method that can avoid anti-debugging techniques in binary files, and showed several samples of anti-debugging applications and how to detect and patch anti-debugging techniques in common utilities or malicious code effectively.
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE