Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments

被引:10
|
作者
Park, Juhyun [1 ]
Jang, Yun-Hwan [2 ]
Hong, Soohwa [1 ]
Park, Yongsu [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci, Seoul, South Korea
[2] Hanyang Univ, Dept Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
computer hacking; computer security; debugging; reverse engineering; software protection;
D O I
10.4316/AECE.2019.02003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult. Unlike most of the previous work that relies on debugger-plugins for neutralizing anti-debugging techniques, we focus on the Pin, which is one of the most widely used DBI (Dynamic Binary Instrumentation) tools in 80x86 environments. In this paper, we present an automatic anti-debugging detection/bypassing scheme using the Pin. In order to evaluate the effectiveness of our algorithm, we conducted experiments on 17 most widely used (commercial) protectors, which results in bypassing all anti-debugging techniques automatically. Particularly, our experiment includes Safengine, which is one of the most complex commercial protectors and, to the best of our knowledge, it has not been successfully analyzed by academic researchers up to now. Also, experimental results show that the proposed scheme performs better than the most recent work, Apate.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 8 条
  • [1] REDIR: Automated Static Detection of Obfuscated Anti-Debugging Techniques
    Smith, Adam J.
    Mills, Robert F.
    Bryant, Adam R.
    Peterson, Gilbert L.
    Grimaila, Michael R.
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 173 - 180
  • [2] Evading Anti-debugging Techniques with Binary Substitution
    Lee, JaeKeun
    Kang, BooJoong
    Im, Eul Gyu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 183 - 192
  • [3] Malware Detection Method Focusing on Anti-Debugging Functions
    Yoshizaki, Kota
    Yamauchi, Toshihiro
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2014, : 563 - 566
  • [4] Measurement of Anti-Debugging Techniques on the Windows and Linux Operating Systems for the Intel x86_64 Architecture
    Norby, Austin
    Rimal, Bhaskar P.
    Brizendine, Bramwell
    IEEE ACCESS, 2025, 13 : 46568 - 46583
  • [5] Disabling Anti-Debugging Techniques for Unpacking System in User-level Debugger
    Kim, Jong-Wouk
    Bang, Jiwon
    Moon, Yang-Sae
    Choi, Mi-Jung
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 954 - 959
  • [6] U Can't Debug This: Detecting Java']JavaScript Anti-Debugging Techniques in the Wild
    Musch, Marius
    Johns, Martin
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2935 - 2950
  • [7] Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware
    Chen, Ping
    Huygens, Christophe
    Desmet, Lieven
    Joosen, Wouter
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 323 - 336
  • [8] Sonar based automatic target detection scheme for underwater environments using CFAR techniques: A comparative study
    Kalyan, B
    Balasuriya, A
    PROCEEDINGS OF THE 2004 INTERNATIONAL SYMPOSIUM ON UNDERWATER TECHNOLOGY, 2004, : 33 - 37