메뉴 건너뛰기




Volumn , Issue , 2013, Pages 289-298

SPIDER: Stealthy binary program instrumentation and debugging via hardware virtualization

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-DEBUGGING; BINARY PROGRAMS; HARDWARE VIRTUALIZATION; INSTRUCTION-LEVEL; INSTRUMENTATION TOOLS; MALWARE ANALYSIS; PROGRAM INSTRUMENTATIONS; SECURITY APPLICATION;

EID: 84893231124     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2523649.2523675     Document Type: Conference Paper
Times cited : (79)

References (40)
  • 1
    • 84893250825 scopus 로고    scopus 로고
    • Gdb. http://www.gnu.org/software/gdb/.
    • Gdb
  • 2
    • 84893246620 scopus 로고    scopus 로고
    • Ida pro. http://www.hex-rays.com/idapro/.
    • Ida Pro
  • 3
    • 84893240599 scopus 로고    scopus 로고
    • Kvm. http://www.linux-kvm.org/.
  • 7
    • 84880262565 scopus 로고    scopus 로고
    • Qemu, a fast and portable dynamic translator
    • F. Bellard. Qemu, a fast and portable dynamic translator. In USENIX ATC'05.
    • USENIX ATC'05
    • Bellard, F.1
  • 12
    • 35448973319 scopus 로고    scopus 로고
    • Pinos: A programmable framework for whole-system dynamic instrumentation
    • P. P. Bungale and C.-K. Luk. Pinos: a programmable framework for whole-system dynamic instrumentation. In VEE'07.
    • VEE'07
    • Bungale, P.P.1    Luk, C.-K.2
  • 13
    • 84893222248 scopus 로고    scopus 로고
    • Introlib: Efficient and transparent library call introspection for malware forensics
    • Z. Deng, D. Xu, X. Zhang, and X. Jiang. Introlib: Efficient and transparent library call introspection for malware forensics. In DFRWS'12.
    • DFRWS'12
    • Deng, Z.1    Xu, D.2    Zhang, X.3    Jiang, X.4
  • 14
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware analysis via hardware virtualization extensions
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In CCS'08.
    • CCS'08
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 15
    • 84858785132 scopus 로고    scopus 로고
    • Comprehensive kernel instrumentation via dynamic binary translation
    • P. Feiner, A. D. Brown, and A. Goel. Comprehensive kernel instrumentation via dynamic binary translation. In ASPLOS'12.
    • ASPLOS'12
    • Feiner, P.1    Brown, A.D.2    Goel, A.3
  • 18
    • 33845406801 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS'03.
    • NDSS'03
    • Garfinkel, T.1    Rosenblum, M.2
  • 20
    • 77949455259 scopus 로고    scopus 로고
    • A study of the packer problem and its solutions
    • F. Guo, P. Ferrie, and T.-C. Chiueh. A study of the packer problem and its solutions. In RAID'08.
    • RAID'08
    • Guo, F.1    Ferrie, P.2    Chiueh, T.-C.3
  • 24
    • 33745949864 scopus 로고    scopus 로고
    • Bochs: A portable pc emulator for unix/x
    • K. P. Lawton. Bochs: A portable pc emulator for unix/x. Linux Journal, 1996.
    • (1996) Linux Journal
    • Lawton, K.P.1
  • 25
    • 84961349074 scopus 로고    scopus 로고
    • High accuracy attack provenance via binary-based execution partition
    • K. H. Lee, X. Zhang, and D. Xu. High accuracy attack provenance via binary-based execution partition. In NDSS'13.
    • NDSS'13
    • Lee, K.H.1    Zhang, X.2    Xu, D.3
  • 30
    • 84893301706 scopus 로고    scopus 로고
    • Dynamic binary instrumentation frameworks: I know you're there spying on me
    • N. Riva and F. Falćon. Dynamic binary instrumentation frameworks: I know you're there spying on me. REcon'12.
    • REcon'12
    • Riva, N.1    Falćon, F.2
  • 34
    • 77951466505 scopus 로고    scopus 로고
    • Re-inforced stealth breakpoints
    • A. Vasudevan. Re-inforced stealth breakpoints. In CRiSIS'09.
    • CRiSIS'09
    • Vasudevan, A.1
  • 35
    • 84893313046 scopus 로고    scopus 로고
    • Cobra: Fine-grained malware analysis using stealth localized-executions
    • A. Vasudevan and R. Yerraballi. Cobra: Fine-grained malware analysis using stealth localized-executions. In IEEE S&P'06.
    • IEEE S&P'06
    • Vasudevan, A.1    Yerraballi, R.2
  • 37
    • 84893234102 scopus 로고    scopus 로고
    • Using hardware performance events for instruction-level monitoring on the x86 architecture
    • S. Vogl and C. Eckert. Using hardware performance events for instruction-level monitoring on the x86 architecture. In EuroSec'12.
    • EuroSec'12
    • Vogl, S.1    Eckert, C.2
  • 39
    • 84863351787 scopus 로고    scopus 로고
    • V2e: Combining hardware virtualization and softwareemulation for transparent and extensible malware analysis
    • L.-K. Yan, M. Jayachandra, M. Zhang, and H. Yin. V2e: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis. In VEE'12.
    • VEE'12
    • Yan, L.-K.1    Jayachandra, M.2    Zhang, M.3    Yin, H.4
  • 40
    • 84893222031 scopus 로고    scopus 로고
    • O. Yuschuk. Ollydbg. http://www.ollydbg.de/.
    • Yuschuk, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.