The ability to trap the execution of a binary program at de sired instructions is essential in many security scenarios such as malware analysis and attack provenance. However, an in creasing percent of both malicious and legitimate programs are equipped with anti-debugging and anti-instrumentation techniques, which render existing debuggers and instrumen tation tools inadequate. In this paper, we present Spi der, a stealthy program instrumentation framework which enables transparent, efficient and flexible instruction-level trapping based on hardware virtualization. Spider uses in visible breakpoint, a novel primitive we develop that inher its the efficiency and flexibility of software breakpoint, and utilizes hardware virtualization to hid...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
The VMware Workstation virtualisation software is widely used by antivirus researchers for malware a...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
The ability to trap the execution of a binary program at de-sired instructions is essential in many ...
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Abstract—With the rapid proliferation of malware attacks on the Internet, understanding these malici...
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering the execu...
Software analysis, debugging, and reverse engineering have a crucial impact in today's software indu...
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in d...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
Code obfuscation techniques are increasingly being used in software for such reasons as protecting t...
Software analysis, debugging, and reverse engineering have a crucial impact in today's software indu...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Debugging could be a threat to system security when adopted by malicious attackers. The major challe...
Dynamic instrumentation systems, used for program analysis, bug isolation, software security and sim...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
The VMware Workstation virtualisation software is widely used by antivirus researchers for malware a...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
The ability to trap the execution of a binary program at de-sired instructions is essential in many ...
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Abstract—With the rapid proliferation of malware attacks on the Internet, understanding these malici...
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering the execu...
Software analysis, debugging, and reverse engineering have a crucial impact in today's software indu...
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in d...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
Code obfuscation techniques are increasingly being used in software for such reasons as protecting t...
Software analysis, debugging, and reverse engineering have a crucial impact in today's software indu...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Debugging could be a threat to system security when adopted by malicious attackers. The major challe...
Dynamic instrumentation systems, used for program analysis, bug isolation, software security and sim...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
The VMware Workstation virtualisation software is widely used by antivirus researchers for malware a...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...