Academic literature on the topic 'Anti-Debugging'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-Debugging.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anti-Debugging"
Kim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Anti-Anti-Debugging Study to Understand and Disable Anti-Debugging for Malware Analysis." Journal of Korean Institute of Communications and Information Sciences 45, no. 1 (January 31, 2020): 105–16. http://dx.doi.org/10.7840/kics.2020.45.1.105.
Full textGagnon, Michael N., Stephen Taylor, and Anup K. Ghosh. "Software Protection through Anti-Debugging." IEEE Security & Privacy Magazine 5, no. 3 (May 2007): 82–84. http://dx.doi.org/10.1109/msp.2007.71.
Full textZhang, Bowen. "Research Summary of Anti-debugging Technology." Journal of Physics: Conference Series 1744, no. 4 (February 1, 2021): 042186. http://dx.doi.org/10.1088/1742-6596/1744/4/042186.
Full textApostolopoulos, Theodoros, Vasilios Katos, Kim-Kwang Raymond Choo, and Constantinos Patsakis. "Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks." Future Generation Computer Systems 116 (March 2021): 393–405. http://dx.doi.org/10.1016/j.future.2020.11.004.
Full textWeng, Jian Tao, Qing Mu, Xin Yi Liao, Yuan Zhang Li, Quan Xin Zhang, and Yuan Tan. "Code Protection Technology on iOS." Applied Mechanics and Materials 644-650 (September 2014): 3371–74. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3371.
Full textLee, JaeKeun, BooJoong Kang, and Eul Gyu Im. "Evading Anti-debugging Techniques with Binary Substitution." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 183–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.17.
Full textKim, Sun-Kyun, Hajin Kim, and Mi-Jung Choi. "Design and Implementation of Malware Automatic Unpacking System in Anti-VM/Debugging Environment." Journal of Korean Institute of Communications and Information Sciences 43, no. 11 (November 30, 2018): 1929–40. http://dx.doi.org/10.7840/kics.2018.43.11.1929.
Full textLee, Seung-Hwan, Hyo-Jeong Shin, and Hyong-Shik Kim. "Methods of bypassing anti-debugging APIs for security test." Journal of Security Engineering 15, no. 1 (February 28, 2018): 25–40. http://dx.doi.org/10.14257/jse.2018.02.01.
Full textKim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (2020): 1178–89. http://dx.doi.org/10.25046/aj0506142.
Full textCho, Haehyun, Jongsu Lim, Hyunki Kim, and Jeong Hyun Yi. "Anti-debugging scheme for protecting mobile apps on android platform." Journal of Supercomputing 72, no. 1 (November 6, 2015): 232–46. http://dx.doi.org/10.1007/s11227-015-1559-9.
Full textDissertations / Theses on the topic "Anti-Debugging"
Čapek, Jan. "Zabezpečení online aplikací typu klient-server." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385888.
Full textBook chapters on the topic "Anti-Debugging"
Xie, Peidai, Xicheng Lu, Yongjun Wang, Jinshu Su, and Meijian Li. "An Automatic Approach to Detect Anti-debugging in Malware Analysis." In Trustworthy Computing and Services, 436–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_55.
Full textChen, Ping, Christophe Huygens, Lieven Desmet, and Wouter Joosen. "Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware." In ICT Systems Security and Privacy Protection, 323–36. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5_22.
Full textO'Donoghue, Cathal. "Anti-Poverty Policy." In Practical Microsimulation Modelling, 63–87. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198852872.003.0003.
Full textVasudevan, Amit. "Effective Malware Analysis Using Stealth Breakpoints." In Threats, Countermeasures, and Advances in Applied Information Security, 444–61. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch023.
Full textConference papers on the topic "Anti-Debugging"
Gao, Shang, Qian Lin, Mingyuan Xia, Miao Yu, Zhengwei Qi, and Haibing Guan. "Debugging classification and anti-debugging strategies." In Fourth International Conference on Machine Vision (ICMV 11), edited by Zhu Zeng and Yuting Li. SPIE, 2011. http://dx.doi.org/10.1117/12.924835.
Full textLee, JaeKeun, BooJoong Kang, and Eul Gyu Im. "Rule-based anti-anti-debugging system." In the 2013 Research in Adaptive and Convergent Systems. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2513228.2513301.
Full textYoshizaki, Kota, and Toshihiro Yamauchi. "Malware Detection Method Focusing on Anti-debugging Functions." In 2014 Second International Symposium on Computing and Networking (CANDAR). IEEE, 2014. http://dx.doi.org/10.1109/candar.2014.36.
Full textYi, Tengfei, Aijun Zong, Miao Yu, Shang Gao, Qian Lin, Peijie Yu, Zhong Ren, and Zhengwei Qi. "Anti-debugging Framework Based on Hardware Virtualization Technology." In 2009 International Conference on Research Challenges in Computer Science (ICRCCS). IEEE, 2009. http://dx.doi.org/10.1109/icrccs.2009.63.
Full textXu Chen, Jon Andersen, Z. Morley Mao, Michael Bailey, and Jose Nazario. "Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware." In 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, 2008. http://dx.doi.org/10.1109/dsn.2008.4630086.
Full textSmith, Adam J., Robert F. Mills, Adam R. Bryant, Gilbert L. Peterson, and Michael R. Grimaila. "REDIR: Automated static detection of obfuscated anti-debugging techniques." In 2014 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2014. http://dx.doi.org/10.1109/cts.2014.6867561.
Full textGao Bing, Lin Guoyuan, and Tang Jiutao. "Application of Structured Exception Handling in software anti-debugging." In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icacte.2010.5579120.
Full textWan, Jia, Mohammad Zulkernine, and Clifford Liem. "A Dynamic App Anti-Debugging Approach on Android ART Runtime." In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2018. http://dx.doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00105.
Full textKim, Jong-Wouk, Jiwon Bang, Yang-Sae Moon, and Mi-Jung Choi. "Disabling Anti-Debugging Techniques for Unpacking System in User-level Debugger." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939719.
Full textLihong Lian, Xiaochao Li, Fen Xiao, and Donghui Guo. "Design and implementation of a debugging system for OpenRISC processor." In 2008 2nd International Conference on Anti-counterfeiting, Security and Identification. IEEE, 2008. http://dx.doi.org/10.1109/iwasid.2008.4688407.
Full text