A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools
2021
IEEE Access
It is very difficult for analysts to bypass anti-VM and anti-DBI techniques that are used in commercial protectors because analysts generally have little information on what methods are used or how to ...
We analyzed the techniques used by five of the most common commercial protectors, and herein present how to bypass anti-VM and anti-DBI techniques supported by commercial protectors via a detailed algorithm ...
ANTI-ANTI VM & ANTI-ANTI DBI OF COMMERCIAL PROTECTORS This section presents an algorithm that can bypass anti-VM and anti-DBI techniques for each tool by using a DBI tool based on the preceding analysis ...
doi:10.1109/access.2020.3048848
fatcat:cfxszcdjebcnhauce6xihycmty
Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger
2020
Advances in Science, Technology and Engineering Systems
However, attackers who create malware use many different kinds of techniques, such as antireverse engineering, to hinder and delay analysis. ...
After the experiments, it confirms whether its countermeasure is useful for malware analysis. ...
Pin [4] is an excellent analysis tool, but it cannot defeat the anti-debugging techniques used by Yoda's Protector. ...
doi:10.25046/aj0506142
fatcat:zh6evvbeijaptga7n5d2uodhla
x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4
2020
IEEE Access
To protect malware, they use packers, which are (commercial) tools that contain various anti-reverse engineering techniques such as code encryption, anti-debugging, and code virtualization. ...
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. ...
ANALYSIS OF THE API OBFUSCATION TECHNIQUES Generally, (commercial) protectors use diverse API obfuscation techniques to deter analysis on API function calls, where major 3 of them [11] are as follows ...
doi:10.1109/access.2020.3008900
fatcat:udr742exbzgfhm3o267cpzh2w4
However, an increasing percent of both malicious and legitimate programs are equipped with anti-debugging and anti-instrumentation techniques, which render existing debuggers and instrumentation tools ...
The ability to trap the execution of a binary program at desired instructions is essential in many security scenarios such as malware analysis and attack provenance. ...
Any opinions, findings, and conclusions in this paper are those of the authors only and do not necessarily reflect the views of DARPA. ...
doi:10.1145/2523649.2523675
dblp:conf/acsac/DengZX13
fatcat:3hnqpybn4vg2xlwvhe2iyhsv2u
Probing the Limits of Virtualized Software Protection
2014
Proceedings of the 4th Program Protection and Reverse Engineering Workshop on 4th Program Protection and Reverse Engineering Workshop - PPREW-4
The resolution of whether such attacks can undermine security will help create better detection and analysis methods for malware that also employ software virtualization. ...
We present results of an empirical study that answers whether integrity of execution can be preserved for process-level virtualization protection schemes in the face of adversarial analysis. ...
Representative DBI tools include Dynamic RIO 6 , PIN [32] , and Valgrind [31] . ...
doi:10.1145/2689702.2689707
dblp:conf/acsac/CazalasMAS14
fatcat:wswgbgbb3vb37l4y6yueh3ecp4
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis
2019
Security and Communication Networks
In particular, the proposed hybrid detection method is superior to the existing methods, and the system performs unpacking very well up to 100% of restoration accuracy for most of the files except for ...
We then improve the unpacking phase by using the state-of-the-art static and dynamic unpacking techniques. We also present a verification algorithm evaluating the accuracy of unpacking results. ...
Unpacking techniques are roughly classified into four types. e first is a direct analysis method in which a person unpacks directly using an analysis tool. is method has been popular in the early days, ...
doi:10.1155/2019/5278137
fatcat:77bigzeoufbi7ejo3xt62tai7e
Equal opportunity employer?
1990
Nursing Standard
These types of sentences use verbs requiring no action. ...
The following abbreviations, when used in the Contract Documents, represent the full text shown. ...
Do not use the plant to supply any other project or to sell materials commercially.
4. ...
doi:10.7748/ns.5.11.42.s51
fatcat:c6wphqvxojdkjg6usy7qcxxwf4
Towards a universal language : evaluating autonomy, identity, and the metropolis in the legacy of Japanese experimental music
2017
of that work. ...
of Japanese music that relied neither upon bland mimicry of the West, nor nationalistic adherence to its own folk traditions. ...
Thanks are also due to Kazu Yasutani, Yasunori Saitoh, and I loppy Kamiyama; plus Kat Tipps, Christine Gregory, Andy Gregory, and my other close friends and family for all of their considerable and priceless ...
doi:10.24377/ljmu.t.00005838
fatcat:yzha35d2ynho3djmgdyeg4l7bu
Jusepe de Ribera's artistic identity and self-fashioning in early modern Italy and Spain
2012
Organized in five chapters, my dissertation examines the methods Ribera used to shape his artistic identity as a Spanish painter working in viceregal Naples. ...
A systematic study of the artist's signatures in his paintings, drawings, and prints forms the core of the third chapter of this dissertation. ...
For modern studies of Spanish viceregal patronage, see Francis 131 (1989): 132-36; Finaldi, 1995, 135-95; Gabriele Finaldi, "Ribera, the Viceroys of Naples and the King: Some Observations on Their Relations ...
doi:10.7282/t34j0cw2
fatcat:tsgnaezvfvdcnerilho6y4hsh4