Journal articles on the topic 'Anti-Debugging'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 journal articles for your research on the topic 'Anti-Debugging.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Anti-Anti-Debugging Study to Understand and Disable Anti-Debugging for Malware Analysis." Journal of Korean Institute of Communications and Information Sciences 45, no. 1 (January 31, 2020): 105–16. http://dx.doi.org/10.7840/kics.2020.45.1.105.
Full textGagnon, Michael N., Stephen Taylor, and Anup K. Ghosh. "Software Protection through Anti-Debugging." IEEE Security & Privacy Magazine 5, no. 3 (May 2007): 82–84. http://dx.doi.org/10.1109/msp.2007.71.
Full textZhang, Bowen. "Research Summary of Anti-debugging Technology." Journal of Physics: Conference Series 1744, no. 4 (February 1, 2021): 042186. http://dx.doi.org/10.1088/1742-6596/1744/4/042186.
Full textApostolopoulos, Theodoros, Vasilios Katos, Kim-Kwang Raymond Choo, and Constantinos Patsakis. "Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks." Future Generation Computer Systems 116 (March 2021): 393–405. http://dx.doi.org/10.1016/j.future.2020.11.004.
Full textWeng, Jian Tao, Qing Mu, Xin Yi Liao, Yuan Zhang Li, Quan Xin Zhang, and Yuan Tan. "Code Protection Technology on iOS." Applied Mechanics and Materials 644-650 (September 2014): 3371–74. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3371.
Full textLee, JaeKeun, BooJoong Kang, and Eul Gyu Im. "Evading Anti-debugging Techniques with Binary Substitution." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 183–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.17.
Full textKim, Sun-Kyun, Hajin Kim, and Mi-Jung Choi. "Design and Implementation of Malware Automatic Unpacking System in Anti-VM/Debugging Environment." Journal of Korean Institute of Communications and Information Sciences 43, no. 11 (November 30, 2018): 1929–40. http://dx.doi.org/10.7840/kics.2018.43.11.1929.
Full textLee, Seung-Hwan, Hyo-Jeong Shin, and Hyong-Shik Kim. "Methods of bypassing anti-debugging APIs for security test." Journal of Security Engineering 15, no. 1 (February 28, 2018): 25–40. http://dx.doi.org/10.14257/jse.2018.02.01.
Full textKim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (2020): 1178–89. http://dx.doi.org/10.25046/aj0506142.
Full textCho, Haehyun, Jongsu Lim, Hyunki Kim, and Jeong Hyun Yi. "Anti-debugging scheme for protecting mobile apps on android platform." Journal of Supercomputing 72, no. 1 (November 6, 2015): 232–46. http://dx.doi.org/10.1007/s11227-015-1559-9.
Full textBing, Xu, Qian Ping, Xu Cheng Qian, and Yuan Fang Hong. "Anti-Explosion Control System for Fine Powder Processing." Applied Mechanics and Materials 130-134 (October 2011): 1978–81. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.1978.
Full textPARK, J., Y. H. JANG, S. HONG, and Y. PARK. "Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments." Advances in Electrical and Computer Engineering 19, no. 2 (2019): 23–28. http://dx.doi.org/10.4316/aece.2019.02003.
Full textBerlato, Stefano, and Mariano Ceccato. "A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps." Journal of Information Security and Applications 52 (June 2020): 102463. http://dx.doi.org/10.1016/j.jisa.2020.102463.
Full textWu, Yin Min, and Yun Zhi Chen. "Design of Anti-Theft Public Bicycle System Based on RFID Technology." Applied Mechanics and Materials 475-476 (December 2013): 743–48. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.743.
Full textPark, Jin-Woo, and Yong-Su Park. "An automatic detection scheme of anti-debugging routines to the environment for analysis." Journal of Internet Computing and Services 15, no. 6 (December 31, 2014): 47–54. http://dx.doi.org/10.7472/jksii.2014.15.6.47.
Full textHong, Soohwa, and Yongsu Park. "The design and implementation of pin plugin tool to bypass anti-debugging techniques." Journal of Internet Computing and Services 17, no. 5 (October 31, 2016): 33–42. http://dx.doi.org/10.7472/jksii.2016.17.5.33.
Full textYe, Xuerong, Yue Wang, Jun Tan, Wei Tang, Guofu Zhai, Wenwen Li, and Ruiming Yuan. "Analysis of the anti-vibration qualified rate of relay considering manual debugging process." IOP Conference Series: Materials Science and Engineering 1043, no. 2 (January 1, 2021): 022070. http://dx.doi.org/10.1088/1757-899x/1043/2/022070.
Full textZuo, Li Xia, and Rong Guang Di. "Hardware Design of Microcomputer Relay Protection Device Based on ARM&DSP." Advanced Materials Research 706-708 (June 2013): 814–17. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.814.
Full textYang, Wooyeol, and Yongsu Park. "Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace." Electronics 10, no. 20 (October 13, 2021): 2491. http://dx.doi.org/10.3390/electronics10202491.
Full textYang, Wooyeol, and Yongsu Park. "Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace." Electronics 10, no. 20 (October 13, 2021): 2491. http://dx.doi.org/10.3390/electronics10202491.
Full textChen, Dan Qiang, Guo Hua Cao, Hui Lin Fan, Jing Hua Wang, and Duo Qi. "Software Design of Test System for Missile Flight Control System." Applied Mechanics and Materials 241-244 (December 2012): 2764–68. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2764.
Full textZheng, Song, Chao Bi, and Yilin Song. "A New Method of Applying Data Engine Technology to Realize Neural Network Control." Algorithms 12, no. 5 (May 9, 2019): 97. http://dx.doi.org/10.3390/a12050097.
Full textChen, Dan Qiang, Guo Hua Cao, Hui Lin Fan, Man Yi Hou, and Jing Hua Wang. "Hardware Design of Test System for Missile Flight Control System." Applied Mechanics and Materials 241-244 (December 2012): 9–13. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.9.
Full textBai, Jin Rong, Guo Zhong Zou, and Shi Guang Mu. "Malware Analysis Platform Based on Secondary Development of Xen." Applied Mechanics and Materials 530-531 (February 2014): 865–68. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.865.
Full textZhang, Chang Li, Jin Jin Zhang, and Hai Bo Liu. "Velocity-Current Double Closed-Loop Control Model and Simulation of BLDCM in Pure Electric Vehicle Applications." Advanced Materials Research 466-467 (February 2012): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amr.466-467.881.
Full textLian, Jing, Ya Fu Zhou, Teng Ma, and Xiao Yong Shen. "Development of Automotive Electronics HIL Simulation Experimental Platform." Applied Mechanics and Materials 44-47 (December 2010): 1893–97. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.1893.
Full textZhang, Shou Zhong. "Research on Outward-Bound to Improve College Students' Social Adaptation Ability with AQ as the Mediating Effect." Advanced Materials Research 971-973 (June 2014): 2611–16. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.2611.
Full textLi, Ming Bin, Dong Wen Yin, and Song Mu. "Design and Implementation on a Novel of Solar Double-Direction Tracking-Device." Applied Mechanics and Materials 121-126 (October 2011): 2630–35. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.2630.
Full textQiu, Yutao, Kai Qian, Liuming Liang, Zhangli Weng, Zhen Huang, and Yuchen Yan. "Research and Application of Full-Link Management Intellectual Inspection Robot with Remote Pre-Control and Information Digitization." Journal of Physics: Conference Series 2083, no. 3 (November 1, 2021): 032077. http://dx.doi.org/10.1088/1742-6596/2083/3/032077.
Full textZhang, Li Guo, and Jing Gao. "Switch Module Designed to Meet the EPS Reliability Intelligent Control." Applied Mechanics and Materials 623 (August 2014): 195–201. http://dx.doi.org/10.4028/www.scientific.net/amm.623.195.
Full textMeng, Tian Xing. "Design of Fiber Optic Digital Telemetry System." Applied Mechanics and Materials 29-32 (August 2010): 2479–83. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2479.
Full textMeng, Da Wei, Yu Feng Lu, Yong Ming Xu, and Xi Feng Wang. "Design and Implementation of BLDCM Driver Based on SOPC." Key Engineering Materials 486 (July 2011): 29–32. http://dx.doi.org/10.4028/www.scientific.net/kem.486.29.
Full textMeng, Da Wei, Yu Feng Lu, Yong Ming Xu, and Xi Feng Wang. "Design of Sine-Wave Control System of BLDCM Regarding a New Permanent-Magnet Material." Advanced Materials Research 321 (August 2011): 37–40. http://dx.doi.org/10.4028/www.scientific.net/amr.321.37.
Full textPiróg, S., R. Stala, and Ł. Stawiarski. "Power electronic converter for photovoltaic systems with the use of FPGA-based real-time modeling of single phase grid-connected systems." Bulletin of the Polish Academy of Sciences: Technical Sciences 57, no. 4 (December 1, 2009): 345–54. http://dx.doi.org/10.2478/v10175-010-0137-9.
Full textChen, Chen, Junqi Xu, Wen Ji, Ruijie Chao, and Yougang Sun. "Adaptive levitation control for characteristic model of low speed maglev vehicle." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 234, no. 7 (January 8, 2020): 1456–67. http://dx.doi.org/10.1177/0954406219899677.
Full textMimura, Mamoru, and Ryo Ito. "Applying NLP techniques to malware detection in a practical environment." International Journal of Information Security, June 6, 2021. http://dx.doi.org/10.1007/s10207-021-00553-8.
Full text"Exploring the API Calls for Malware Behavior Detection using Concordance and Document Frequency." International Journal of Engineering and Advanced Technology 8, no. 6 (August 30, 2019): 4991–97. http://dx.doi.org/10.35940/ijeat.f9144.088619.
Full text