Academic literature on the topic 'Anti-Debugging'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-Debugging.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Anti-Debugging"

1

Kim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Anti-Anti-Debugging Study to Understand and Disable Anti-Debugging for Malware Analysis." Journal of Korean Institute of Communications and Information Sciences 45, no. 1 (January 31, 2020): 105–16. http://dx.doi.org/10.7840/kics.2020.45.1.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gagnon, Michael N., Stephen Taylor, and Anup K. Ghosh. "Software Protection through Anti-Debugging." IEEE Security & Privacy Magazine 5, no. 3 (May 2007): 82–84. http://dx.doi.org/10.1109/msp.2007.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Bowen. "Research Summary of Anti-debugging Technology." Journal of Physics: Conference Series 1744, no. 4 (February 1, 2021): 042186. http://dx.doi.org/10.1088/1742-6596/1744/4/042186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Apostolopoulos, Theodoros, Vasilios Katos, Kim-Kwang Raymond Choo, and Constantinos Patsakis. "Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks." Future Generation Computer Systems 116 (March 2021): 393–405. http://dx.doi.org/10.1016/j.future.2020.11.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weng, Jian Tao, Qing Mu, Xin Yi Liao, Yuan Zhang Li, Quan Xin Zhang, and Yuan Tan. "Code Protection Technology on iOS." Applied Mechanics and Materials 644-650 (September 2014): 3371–74. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3371.

Full text
Abstract:
This paper targets to the lag of code protection technology for Mach-O executable file on iOS. Consideration of code tamper, code injection on iOS, this paper has proposed a code protection scheme MFP(Mach-O File Protector) featuring with both encryption function and anti-debugging function based on UPX(the Ultimate Packer for eXecutables). Compared with UPX, MFP encrypt Mach-O executable file through 3DES and insert anti-debugging code to disable mainstream debugging software.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, JaeKeun, BooJoong Kang, and Eul Gyu Im. "Evading Anti-debugging Techniques with Binary Substitution." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 183–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Sun-Kyun, Hajin Kim, and Mi-Jung Choi. "Design and Implementation of Malware Automatic Unpacking System in Anti-VM/Debugging Environment." Journal of Korean Institute of Communications and Information Sciences 43, no. 11 (November 30, 2018): 1929–40. http://dx.doi.org/10.7840/kics.2018.43.11.1929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Seung-Hwan, Hyo-Jeong Shin, and Hyong-Shik Kim. "Methods of bypassing anti-debugging APIs for security test." Journal of Security Engineering 15, no. 1 (February 28, 2018): 25–40. http://dx.doi.org/10.14257/jse.2018.02.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (2020): 1178–89. http://dx.doi.org/10.25046/aj0506142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cho, Haehyun, Jongsu Lim, Hyunki Kim, and Jeong Hyun Yi. "Anti-debugging scheme for protecting mobile apps on android platform." Journal of Supercomputing 72, no. 1 (November 6, 2015): 232–46. http://dx.doi.org/10.1007/s11227-015-1559-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Anti-Debugging"

1

Čapek, Jan. "Zabezpečení online aplikací typu klient-server." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385888.

Full text
Abstract:
This thesis is dedicated to security of client-server applications running on Windows platform. In the beginning chapters it is possible to find motivation, about why this type of security is important. Following content describes some elements of used architecture and elements of operating system Windows. The core of the work contains techniques and tools used by the attacker and protection against them. In following chapter there is a design and implementation of the security solution based on the previous theory. This solution is then tested against various threats, to verify its effectivity.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Anti-Debugging"

1

Xie, Peidai, Xicheng Lu, Yongjun Wang, Jinshu Su, and Meijian Li. "An Automatic Approach to Detect Anti-debugging in Malware Analysis." In Trustworthy Computing and Services, 436–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Ping, Christophe Huygens, Lieven Desmet, and Wouter Joosen. "Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware." In ICT Systems Security and Privacy Protection, 323–36. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O'Donoghue, Cathal. "Anti-Poverty Policy." In Practical Microsimulation Modelling, 63–87. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198852872.003.0003.

Full text
Abstract:
This chapter discusses the development of a static microsimulation model for the purpose of undertaking an anti-poverty policy reform. Microsimulation models, which simulate the legislative detail of poverty-reduction instruments, can be used to make social-protection instruments more effective in this objective by helping to improve the targeting of these instruments. This chapter describes firstly the structure of the dataset required for microsimulation modelling. It then creates a theoretical understanding of the structure of social transfers, and of the concept of a hypothetical microsimulation model. Although the model developed in this chapter abstracts from the population complexity described in Chapter 1, it allows us in a simpler way to understand the targeting and structure of anti-poverty policies. Some of the issues that arise in creating a base dataset for a microsimulation model are discussed. As validation, debugging, and error checking are paramount in model development, the use of a hypothetical family model to use for validation purposes is introduced. We define some concepts used to calculate the poverty efficiency of a social-protection instrument. Finally, the chapter undertakes a simulation of the development of a means-tested benefit.
APA, Harvard, Vancouver, ISO, and other styles
4

Vasudevan, Amit. "Effective Malware Analysis Using Stealth Breakpoints." In Threats, Countermeasures, and Advances in Applied Information Security, 444–61. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch023.

Full text
Abstract:
Fine-grained malware analysis requires various powerful analysis tools. Chief among them is a debugger that enables runtime binary analysis at the instruction level. One of the important services provided by a debugger is the ability to stop execution of code at arbitrary points during runtime, using breakpoints. Software breakpoints change the code being analyzed so that it can be interrupted during runtime. Most, if not all malware are very sensitive to code modification with self-modifying and/or self-checking capabilities, rendering the use of software breakpoints limited in their scope. Hardware breakpoints on the other hand, use a subset of the CPU registers and exception mechanisms to provide breakpoints that do not entail code modification. However, hardware breakpoints support limited breakpoint ability (typically only 2-4 locations) and are susceptible to various anti-debugging techniques employed by malware. This chapter describes a novel breakpoint technique (called stealth breakpoints) that provides unlimited number of breakpoints which are robust to detection and countering mechanisms. Further, stealth breakpoints retain all the features (code, data and I/O breakpoint abilities) of existing hardware and software breakpoint schemes and enables easy integration with existing debuggers.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Anti-Debugging"

1

Gao, Shang, Qian Lin, Mingyuan Xia, Miao Yu, Zhengwei Qi, and Haibing Guan. "Debugging classification and anti-debugging strategies." In Fourth International Conference on Machine Vision (ICMV 11), edited by Zhu Zeng and Yuting Li. SPIE, 2011. http://dx.doi.org/10.1117/12.924835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, JaeKeun, BooJoong Kang, and Eul Gyu Im. "Rule-based anti-anti-debugging system." In the 2013 Research in Adaptive and Convergent Systems. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2513228.2513301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yoshizaki, Kota, and Toshihiro Yamauchi. "Malware Detection Method Focusing on Anti-debugging Functions." In 2014 Second International Symposium on Computing and Networking (CANDAR). IEEE, 2014. http://dx.doi.org/10.1109/candar.2014.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yi, Tengfei, Aijun Zong, Miao Yu, Shang Gao, Qian Lin, Peijie Yu, Zhong Ren, and Zhengwei Qi. "Anti-debugging Framework Based on Hardware Virtualization Technology." In 2009 International Conference on Research Challenges in Computer Science (ICRCCS). IEEE, 2009. http://dx.doi.org/10.1109/icrccs.2009.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu Chen, Jon Andersen, Z. Morley Mao, Michael Bailey, and Jose Nazario. "Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware." In 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, 2008. http://dx.doi.org/10.1109/dsn.2008.4630086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Adam J., Robert F. Mills, Adam R. Bryant, Gilbert L. Peterson, and Michael R. Grimaila. "REDIR: Automated static detection of obfuscated anti-debugging techniques." In 2014 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2014. http://dx.doi.org/10.1109/cts.2014.6867561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gao Bing, Lin Guoyuan, and Tang Jiutao. "Application of Structured Exception Handling in software anti-debugging." In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icacte.2010.5579120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wan, Jia, Mohammad Zulkernine, and Clifford Liem. "A Dynamic App Anti-Debugging Approach on Android ART Runtime." In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2018. http://dx.doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Jong-Wouk, Jiwon Bang, Yang-Sae Moon, and Mi-Jung Choi. "Disabling Anti-Debugging Techniques for Unpacking System in User-level Debugger." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lihong Lian, Xiaochao Li, Fen Xiao, and Donghui Guo. "Design and implementation of a debugging system for OpenRISC processor." In 2008 2nd International Conference on Anti-counterfeiting, Security and Identification. IEEE, 2008. http://dx.doi.org/10.1109/iwasid.2008.4688407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography