Dynamic binary instrumentation (DBI) systems are a popular solution for prototyping heterogeneous program analyses and monitoring tools. Several works from academic and practitioner venues have questioned the transparency of DBI systems, with anti-analysis detection sequences being found already in malware and executable protectors. The present Field Note details new and established detection methods and evaluates recent versions of popular DBI systems against them. It also sets out reflections on potential remediations and alternatives available to security researchers for their daily needs. We make available a large collection of implemented detections, hoping it can help the community build better DBI runtimes and tools
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Malware stands for malicious software, which is installed on a computer system without the knowledge...
Downloading software from unknown sources constitutes a great risk. Studies have described file-shar...
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering the execu...
Dynamic Binary Instrumentation (DBI) is a dynamic analysis technique that allows arbitrary code to b...
With the rapid development of Internet, malware has become increasingly serious in the field of comp...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
International audienceWe propose to extend the toolbox of reverse engineers beyond disassemblers, de...
Robust and powerful software instrumentation tools are essential for dynamic program analysis tasks ...
Robust and powerful software instrumentation tools are es-sential for dynamic program analysis tasks...
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analy...
Anti-virus vendors are confronted with a multitude of potentially malicious samples today. Receiving...
Currently, software organizations face critical issues associated with computer security, considerin...
Currently, software organizations face critical issues associated with computer security, considerin...
Finding, understanding, and fixing bugs in software systems is challenging. Dynamic binary trans-lat...
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Malware stands for malicious software, which is installed on a computer system without the knowledge...
Downloading software from unknown sources constitutes a great risk. Studies have described file-shar...
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering the execu...
Dynamic Binary Instrumentation (DBI) is a dynamic analysis technique that allows arbitrary code to b...
With the rapid development of Internet, malware has become increasingly serious in the field of comp...
Program instrumentation techniques form the basis of many recent software security defenses, includi...
International audienceWe propose to extend the toolbox of reverse engineers beyond disassemblers, de...
Robust and powerful software instrumentation tools are essential for dynamic program analysis tasks ...
Robust and powerful software instrumentation tools are es-sential for dynamic program analysis tasks...
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analy...
Anti-virus vendors are confronted with a multitude of potentially malicious samples today. Receiving...
Currently, software organizations face critical issues associated with computer security, considerin...
Currently, software organizations face critical issues associated with computer security, considerin...
Finding, understanding, and fixing bugs in software systems is challenging. Dynamic binary trans-lat...
The capabilities of software analysis and manipulation are crucial to counter software security thre...
Malware stands for malicious software, which is installed on a computer system without the knowledge...
Downloading software from unknown sources constitutes a great risk. Studies have described file-shar...