Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks
Resumen: Malicious applications pose as one of the most relevant issues in today’s technology scenario, being considered the root of many Internet security threats. In part, this owes the ability of malware developers to promptly respond to the emergence of new security solutions by developing artifacts to detect and avoid them. In this work, we present three countermeasures to mitigate recent mechanisms used by malware to detect analysis environments. Among these techniques, this work focuses on those that enable a malware to detect dynamic binary instrumentation frameworks, thus increasing their attack surface. To ensure the effectiveness of the proposed countermeasures, proofs of concept were developed and tested in a controlled environment with a set of anti-instrumentation techniques. Finally, we evaluated the performance impact of using such countermeasures.
Idioma: Inglés
DOI: 10.1007/978-981-13-9155-2_1
Año: 2020
Publicado en: Smart innovation, systems and technologies 152 (2020), 3-13
ISSN: 2190-3018

Factor impacto SCIMAGO: 0.171 - Decision Sciences (miscellaneous) (Q4) - Computer Science (miscellaneous) (Q4)

Financiación: info:eu-repo/grantAgreement/ES/DGA/T21-17R-DISCO
Tipo y forma: Comunicación congreso (PostPrint)
Área (Departamento): Área Lenguajes y Sistemas Inf. (Dpto. Informát.Ingenie.Sistms.)

Derechos Reservados Derechos reservados por el editor de la revista


Exportado de SIDERAL (2023-07-06-07:57:56)


Visitas y descargas

Este artículo se encuentra en las siguientes colecciones:
Artículos > Artículos por área > Lenguajes y Sistemas Informáticos



 Registro creado el 2023-07-06, última modificación el 2023-07-06


Postprint:
 PDF
Valore este documento:

Rate this document:
1
2
3
 
(Sin ninguna reseña)