Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to address a transparent, effective, and high-performance low-level debugger due to their detectable fingerprints, complexity, and implementation restrictions. In this paper, we present HyperDbg, a new hypervisor-assisted debugger for high-performance and stealthy debugging of user and kernel applications. To accomplish this, HyperDbg relies on state-of-the-art hardware features available in today's CPUs, such as VT-x and extended page tables. In contrast to other widely used existing debuggers, we design HyperDbg us...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
Debugging could be a threat to system security when adopted by malicious attackers. The major challe...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Software analysis, debugging, and reverse engineering have a crucial impact in today's software indu...
Abstract—With the rapid proliferation of malware attacks on the Internet, understanding these malici...
Dynamic malware analysis involves the debugging of the associated binary files and the monitoring of...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective techn...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
The motivation for this project is driven by evaluation of the different tools on the market that al...
The ability to trap the execution of a binary program at de sired instructions is essential in many ...
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assi...
The ability to trap the execution of a binary program at de-sired instructions is essential in many ...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGua...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
Debugging could be a threat to system security when adopted by malicious attackers. The major challe...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Software analysis, debugging, and reverse engineering have a crucial impact in today's software indu...
Abstract—With the rapid proliferation of malware attacks on the Internet, understanding these malici...
Dynamic malware analysis involves the debugging of the associated binary files and the monitoring of...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective techn...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
The motivation for this project is driven by evaluation of the different tools on the market that al...
The ability to trap the execution of a binary program at de sired instructions is essential in many ...
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assi...
The ability to trap the execution of a binary program at de-sired instructions is essential in many ...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGua...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
Debugging could be a threat to system security when adopted by malicious attackers. The major challe...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...