咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 9 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 19 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 7 篇 信息与通信工程
    • 4 篇 软件工程
    • 1 篇 仪器科学与技术
  • 2 篇 理学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学

主题

  • 27 篇 anti-debugging
  • 5 篇 malware
  • 3 篇 expert systems
  • 3 篇 software protect...
  • 3 篇 reverse code eng...
  • 2 篇 evasion techniqu...
  • 2 篇 psscan
  • 2 篇 debugging
  • 2 篇 acquisition tool...
  • 2 篇 packing
  • 2 篇 pslist
  • 2 篇 sensemaking
  • 2 篇 karos online
  • 2 篇 memory forensics...
  • 2 篇 code obfuscation
  • 2 篇 malware detectio...
  • 2 篇 dynamic analysis
  • 2 篇 anti-virtualizat...
  • 2 篇 anti-tampering
  • 1 篇 cyber security

机构

  • 1 篇 fdn bruno kessle...
  • 1 篇 athena res ctr a...
  • 1 篇 pusan natl univ ...
  • 1 篇 univ texas san a...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ alabama dep...
  • 1 篇 bogart associate...
  • 1 篇 univ verona comp...
  • 1 篇 kangwon natl uni...
  • 1 篇 shanghai jiao to...
  • 1 篇 okayama univ gra...
  • 1 篇 uptycs india pvt...
  • 1 篇 beijing univ pos...
  • 1 篇 esiea c v o lab ...
  • 1 篇 v key pte ltd
  • 1 篇 osaka univ osaka
  • 1 篇 queens univ sch ...
  • 1 篇 univ piraeus 80 ...
  • 1 篇 univ idaho dept ...
  • 1 篇 univ verona vero...

作者

  • 3 篇 qi zhengwei
  • 3 篇 yu miao
  • 3 篇 lin qian
  • 2 篇 guan haibing
  • 2 篇 gao shang
  • 2 篇 berlato stefano
  • 2 篇 ceccato mariano
  • 2 篇 xia mingyuan
  • 1 篇 ahmed waqas
  • 1 篇 mah benjamin
  • 1 篇 aslam baber
  • 1 篇 utaliyeva assem
  • 1 篇 shi chengjie
  • 1 篇 bang jiwon
  • 1 篇 coppens bart
  • 1 篇 joo jung-uk
  • 1 篇 yi jeong hyun
  • 1 篇 smith adam
  • 1 篇 afianian amir
  • 1 篇 bryant adam r.

语言

  • 26 篇 英文
  • 1 篇 其他
检索条件"主题词=Anti-debugging"
27 条 记 录,以下是1-10 订阅
排序:
Measurement of anti-debugging Techniques on the Windows and Linux Operating Systems for the Intel x86_64 Architecture
收藏 引用
IEEE ACCESS 2025年 13卷 46568-46583页
作者: Norby, Austin Rimal, Bhaskar P. Brizendine, Bramwell Bogart Associates Northern Virginia Reston VA 20190 USA Univ Idaho Dept Comp Sci Moscow ID 83844 USA Univ Alabama Dept Comp Sci Huntsville AL 35899 USA
Malware authors and software protection frameworks often use anti-debugging techniques to hinder understanding of the underlying code. Companies use anti-debugging techniques to prevent intellectual property, includin... 详细信息
来源: 评论
anti-debugging scheme for protecting mobile apps on android platform
收藏 引用
JOURNAL OF SUPERCOMPUTING 2016年 第1期72卷 232-246页
作者: Cho, Haehyun Lim, Jongsu Kim, Hyunki Yi, Jeong Hyun Soongsil Univ Sch Comp Sci & Engn Seoul 156743 South Korea
The Android application package file, APK file, can be easily decompiled using Android reverse engineering tools. Thus, general apps can be easily transformed into malicious application through reverse engineering and... 详细信息
来源: 评论
anti-debugging Framework Based on Hardware Virtualization Technology
Anti-debugging Framework Based on Hardware Virtualization Te...
收藏 引用
International Conference on Research Challenges in Computer Science
作者: Yi, Tengfei Zong, Aijun Yu, Miao Gao, Shang Lin, Qian Yu, Peijie Ren, Zhong Qi, Zhengwei Shanghai Jiao Tong Univ Sch Software Shanghai 200030 Peoples R China
anti-debugging technique is widely used to protect executable files in commercial software applications. However, most of contemporary anti-debugging products fail to guarantee their functionalities in that when the a... 详细信息
来源: 评论
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2021年 116卷 393-405页
作者: Apostolopoulos, Theodoros Katos, Vasilios Choo, Kim-Kwang Raymond Patsakis, Constantinos Univ Piraeus 80 Karaoli & Dimitriou Str Piraeus 18534 Greece Bournemouth Univ Poole House P323Talbot Campus Poole BH12 5BB Dorset England Univ Texas San Antonio 1 UTSA Cir San Antonio TX 78249 USA Athena Res Ctr Artemidos 6 Maroussi 15125 Greece
Dynamic malware analysis involves the debugging of the associated binary files and the monitoring of changes in sandboxed environments. This allows the investigator to manipulate the code execution path and environmen... 详细信息
来源: 评论
REDIR: Automated Static Detection of Obfuscated anti-debugging Techniques
REDIR: Automated Static Detection of Obfuscated Anti-Debuggi...
收藏 引用
International Conference on Collaboration Technologies and Systems (CTS)
作者: Smith, Adam J. Mills, Robert F. Bryant, Adam R. Peterson, Gilbert L. Grimaila, Michael R. US Air Force Inst Technol Ctr Cyberspace Res Wright Patterson AFB OH 45433 USA Cyber Res Lab Riverside Res Beavercreek OH 45431 USA
Reverse Code Engineering (RCE) to detect anti-debugging techniques in software is a very difficult task. Code obfuscation is an anti-debugging technique makes detection even more challenging. The Rule Engine Detection... 详细信息
来源: 评论
A Dynamic App anti-debugging Approach on Android ART Runtime  16
A Dynamic App Anti-Debugging Approach on Android ART Runtime
收藏 引用
16th IEEE Int Conf on Dependable, Autonom and Secure Comp/16th IEEE Int Conf on Pervas Intelligence and Comp/4th IEEE Int Conf on Big Data Intelligence and Comp/3rd IEEE Cyber Sci and Technol Congress (DASC/PiCom/DataCom/CyberSciTech)
作者: Wan, Jia Zulkernine, Mohammad Liem, Clifford Queens Univ Sch Comp Kingston ON Canada Irdeto Corp Ottawa ON Canada
App anti-debugging techniques can protect app behavior from being leaked to attackers, thus reducing the possibilities of being compromised. Apps are vulnerable to being debugged in an insecure Android environment suc... 详细信息
来源: 评论
Thwarting Piracy: anti-debugging Using GPU-assisted Self-healing Codes  15
Thwarting Piracy: Anti-debugging Using GPU-assisted Self-hea...
收藏 引用
15th International Conference on Communication Systems and Networks (COMSNETS)
作者: Mishra, Adhokshaj Hanawal, Manjesh K. Uptycs India Pvt Ltd Bengaluru India Indian Inst Technol IEOR MLiONS Lab Mumbai Maharashtra India
Software piracy is one of the concerns in the IT sector. Pirates leverage the debugger tools to reverse engineer the logic that verifies the license keys or bypass the entire verification process. anti-debugging techn... 详细信息
来源: 评论
debugging Classification and anti-debugging Strategies
Debugging Classification and Anti-Debugging Strategies
收藏 引用
4th International Conference on Machine Vision (ICMV) - Computer Vision and Image Analysis - Pattern Recognition and Basic Technologies
作者: Gao, Shang Lin, Qian Xia, Mingyuan Yu, Miao Qi, Zhengwei Guan, Haibing Shanghai Jiao Tong Univ Shanghai 200030 Peoples R China
debugging, albeit useful for software development, is also a double-edge sword since it could also be exploited by malicious attackers. This paper analyzes the prevailing debuggers and classifies them into 4 categorie... 详细信息
来源: 评论
Disabling anti-debugging Techniques for Unpacking System in User-level Debugger  10
Disabling Anti-Debugging Techniques for Unpacking System in ...
收藏 引用
10th International Conference on Information and Communication Technology Convergence (ICTC) - ICT Convergence Leading the Autonomous Future
作者: Kim, Jong-Wouk Bang, Jiwon Moon, Yang-Sae Choi, Mi-Jung Kangwon Natl Univ Dept Comp Sci Gangwon Do South Korea
E-mail attacks and spear phishing attacks, which have been pretended as corporations and civil servants, are occurring frequently. Phishing is used to steal user's personal or financial information by redirecting ... 详细信息
来源: 评论
Malware Detection Method Focusing on anti-debugging Functions  2
Malware Detection Method Focusing on Anti-Debugging Function...
收藏 引用
International Symposium on Computing and Networking CANDAR
作者: Yoshizaki, Kota Yamauchi, Toshihiro Okayama Univ Grad Sch Nat Sci & Technol Kita Ku 3-1-1 Tsushima Naka Okayama 7008530 Japan
Malware has received much attention in recent years. antivirus software is widely used as a countermeasure against malware. However, some kinds of malware can evade detection by antivirus software;hence, a new detecti... 详细信息
来源: 评论