Reduzindo a Superfície de Ataque dos Frameworks de Instrumentação Binária Dinâmica
暂无分享,去创建一个
[1] Dynamic binary analysis and instrumentation: or building tools is easy , 2004 .
[2] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[3] Ed Skoudis,et al. Hiding Virtualization from Attackers and Malware , 2007, IEEE Security & Privacy.
[4] Qin Zhao,et al. Transparent dynamic instrumentation , 2012, VEE '12.
[5] Xiangyu Zhang,et al. SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization , 2013, ACSAC.
[6] Paul T. Groth,et al. Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation , 2014, IPAW.
[7] Aaron Walters,et al. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory , 2014 .
[8] Matthew Ryan Gilboy. Fighting Evasive Malware with DVasion , 2016 .
[9] Ricardo J. Rodriguez,et al. Towards the Detection of Isolation-Aware Malware , 2016, IEEE Latin America Transactions.
[10] Pansy Arafa,et al. Time-Aware Dynamic Binary Instrumentation , 2017 .
[11] Stefano Zanero,et al. Measuring and Defeating Anti-Instrumentation-Equipped Malware , 2017, DIMVA.