9 Hits in 8.7 sec

Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools

Young Bi Lee, Jae Hyuk Suk, Dong Hoon Lee
2021 IEEE Access  
It is very difficult for analysts to bypass anti-VM and anti-DBI techniques that are used in commercial protectors because analysts generally have little information on what methods are used or how to  ...  We analyzed the techniques used by five of the most common commercial protectors, and herein present how to bypass anti-VM and anti-DBI techniques supported by commercial protectors via a detailed algorithm  ...  ANTI-ANTI VM & ANTI-ANTI DBI OF COMMERCIAL PROTECTORS This section presents an algorithm that can bypass anti-VM and anti-DBI techniques for each tool by using a DBI tool based on the preceding analysis  ... 
doi:10.1109/access.2020.3048848 fatcat:cfxszcdjebcnhauce6xihycmty

Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger

Jong-Wouk Kim, Jiwon Bang, Mi-Jung Choi
2020 Advances in Science, Technology and Engineering Systems  
However, attackers who create malware use many different kinds of techniques, such as antireverse engineering, to hinder and delay analysis.  ...  After the experiments, it confirms whether its countermeasure is useful for malware analysis.  ...  Pin [4] is an excellent analysis tool, but it cannot defeat the anti-debugging techniques used by Yoda's Protector.  ... 
doi:10.25046/aj0506142 fatcat:zh6evvbeijaptga7n5d2uodhla

x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4

Seokwoo Choi, Taejoo Chang, Changhyun Kim, Yongsu Park
2020 IEEE Access  
To protect malware, they use packers, which are (commercial) tools that contain various anti-reverse engineering techniques such as code encryption, anti-debugging, and code virtualization.  ...  In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.  ...  ANALYSIS OF THE API OBFUSCATION TECHNIQUES Generally, (commercial) protectors use diverse API obfuscation techniques to deter analysis on API function calls, where major 3 of them [11] are as follows  ... 
doi:10.1109/access.2020.3008900 fatcat:udr742exbzgfhm3o267cpzh2w4


Zhui Deng, Xiangyu Zhang, Dongyan Xu
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
However, an increasing percent of both malicious and legitimate programs are equipped with anti-debugging and anti-instrumentation techniques, which render existing debuggers and instrumentation tools  ...  The ability to trap the execution of a binary program at desired instructions is essential in many security scenarios such as malware analysis and attack provenance.  ...  Any opinions, findings, and conclusions in this paper are those of the authors only and do not necessarily reflect the views of DARPA.  ... 
doi:10.1145/2523649.2523675 dblp:conf/acsac/DengZX13 fatcat:3hnqpybn4vg2xlwvhe2iyhsv2u

Probing the Limits of Virtualized Software Protection

Joshua Cazalas, J. Todd McDonald, Todd R. Andel, Natalia Stakhanova
2014 Proceedings of the 4th Program Protection and Reverse Engineering Workshop on 4th Program Protection and Reverse Engineering Workshop - PPREW-4  
The resolution of whether such attacks can undermine security will help create better detection and analysis methods for malware that also employ software virtualization.  ...  We present results of an empirical study that answers whether integrity of execution can be preserved for process-level virtualization protection schemes in the face of adversarial analysis.  ...  Representative DBI tools include Dynamic RIO 6 , PIN [32] , and Valgrind [31] .  ... 
doi:10.1145/2689702.2689707 dblp:conf/acsac/CazalasMAS14 fatcat:wswgbgbb3vb37l4y6yueh3ecp4

All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis

Mi-Jung Choi, Jiwon Bang, Jongwook Kim, Hajin Kim, Yang-Sae Moon
2019 Security and Communication Networks  
In particular, the proposed hybrid detection method is superior to the existing methods, and the system performs unpacking very well up to 100% of restoration accuracy for most of the files except for  ...  We then improve the unpacking phase by using the state-of-the-art static and dynamic unpacking techniques. We also present a verification algorithm evaluating the accuracy of unpacking results.  ...  Unpacking techniques are roughly classified into four types. e first is a direct analysis method in which a person unpacks directly using an analysis tool. is method has been popular in the early days,  ... 
doi:10.1155/2019/5278137 fatcat:77bigzeoufbi7ejo3xt62tai7e

Equal opportunity employer?

R P Taylor
1990 Nursing Standard  
These types of sentences use verbs requiring no action.  ...  The following abbreviations, when used in the Contract Documents, represent the full text shown.  ...  Do not use the plant to supply any other project or to sell materials commercially. 4.  ... 
doi:10.7748/ns.5.11.42.s51 fatcat:c6wphqvxojdkjg6usy7qcxxwf4

Towards a universal language : evaluating autonomy, identity, and the metropolis in the legacy of Japanese experimental music

M Gregory
of that work.  ...  of Japanese music that relied neither upon bland mimicry of the West, nor nationalistic adherence to its own folk traditions.  ...  Thanks are also due to Kazu Yasutani, Yasunori Saitoh, and I loppy Kamiyama; plus Kat Tipps, Christine Gregory, Andy Gregory, and my other close friends and family for all of their considerable and priceless  ... 
doi:10.24377/ljmu.t.00005838 fatcat:yzha35d2ynho3djmgdyeg4l7bu

Jusepe de Ribera's artistic identity and self-fashioning in early modern Italy and Spain

Lisandra Estevez
Organized in five chapters, my dissertation examines the methods Ribera used to shape his artistic identity as a Spanish painter working in viceregal Naples.  ...  A systematic study of the artist's signatures in his paintings, drawings, and prints forms the core of the third chapter of this dissertation.  ...  For modern studies of Spanish viceregal patronage, see Francis 131 (1989): 132-36; Finaldi, 1995, 135-95; Gabriele Finaldi, "Ribera, the Viceroys of Naples and the King: Some Observations on Their Relations  ... 
doi:10.7282/t34j0cw2 fatcat:tsgnaezvfvdcnerilho6y4hsh4