2017
DOI: 10.1007/s41635-017-0013-2
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Function and System Call Hooking Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…In order to see the effects of different amount of obfuscations, we firstly obfuscated 25% of the function names in the source and header files of Webminerpool. Then, we increased the number of function names to 50%, 75%, and finally, to 100% in which every function name was obfuscated, excluding C memory management functions (i.e., memset, memcpy, malloc and free) [38], [39], [40]. Figure 7 shows the gray-scale image representations of the resulting miner samples.…”
Section: E Minos Against Obfuscationmentioning
confidence: 99%
“…In order to see the effects of different amount of obfuscations, we firstly obfuscated 25% of the function names in the source and header files of Webminerpool. Then, we increased the number of function names to 50%, 75%, and finally, to 100% in which every function name was obfuscated, excluding C memory management functions (i.e., memset, memcpy, malloc and free) [38], [39], [40]. Figure 7 shows the gray-scale image representations of the resulting miner samples.…”
Section: E Minos Against Obfuscationmentioning
confidence: 99%
“…Hooking can be defined as the interception of specific functions or system calls to monitor and/or alter its execution [19]. As previously discussed, hooking can be undertaken in the event that one does not have the source code, but there is a need to determine which API calls, subroutines are called from a given process.…”
Section: Hookingmentioning
confidence: 99%
“…We refer readers interested in other methods for kernel-level hooking, such as hooking the System Service Descriptor and the Interrupt Descriptor Table , to existing literature such as [26,27,19,28].…”
Section: Hookingmentioning
confidence: 99%
“…Other work has focused on IoT security aspects, such as the survey by Deogirikar et al, which focused specifically on known IoT attacks [341]. Individually, as early as 2013, works have highlighted threats in smart devices, and how attackers always search for new, unexplored threat vectors [5]- [7], [9], [11]- [14]. However, very little ongoing research has focused on specific vulnerabilities targeting E-IoT systems or proprietary technologies.…”
Section: Related Workmentioning
confidence: 99%