2020
DOI: 10.1007/s11227-020-03270-6
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid emulation for bypassing anti-reversing techniques and analyzing malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Choi et al [16] proposed HybridEmu, a DBI framework for dynamically analyzing malware. They compared various DBI frameworks to prove resistance to 29 common antidebug techniques and anti-debug techniques provided by 17 commercial protectors.…”
Section: Introductionmentioning
confidence: 99%
“…Choi et al [16] proposed HybridEmu, a DBI framework for dynamically analyzing malware. They compared various DBI frameworks to prove resistance to 29 common antidebug techniques and anti-debug techniques provided by 17 commercial protectors.…”
Section: Introductionmentioning
confidence: 99%
“…Among the many samples, there were some that this paper failed to analyze. Because this work can defeat some APIs and PEB structure-based anti-debugging techniques, the antidebugging using different artifacts could not be defeated, such as RDTSC instruction, Memory Breakpoint, Self-Modifying, and Single-Step Detection [22].…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, the DBI can bypass the anti-debugging techniques by code insertion. However, analysis is inconvenient, and some DBIs cannot execute complex programs correctly [22]. Recently Hao Shi and Jelena Mirkovic proposed the Apate framework to analyze malware [23].…”
Section: Related Workmentioning
confidence: 99%
“…Choi et al proposed HybridEmu [35], which is a dynamic analysis scheme for investigating the internal structure of malicious code in Microsoft Windows 32-bit environments. Similar to xUnpack64 [12], HybridEmu can directly call or emulate various API functions in malware while emulating instructions using a 32-bit CPU simulator.…”
Section: Related Workmentioning
confidence: 99%