Software Protection through Anti-Debugging

This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE security & privacy 2007-05, Vol.5 (3), p.82-84
Hauptverfasser: Gagnon, Michael N., Taylor, Stephen, Ghosh, Anup K.
Format: Magazinearticle
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 84
container_issue 3
container_start_page 82
container_title IEEE security & privacy
container_volume 5
creator Gagnon, Michael N.
Taylor, Stephen
Ghosh, Anup K.
description This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.
doi_str_mv 10.1109/MSP.2007.71
format Magazinearticle
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_912230545</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4218560</ieee_id><sourcerecordid>1671293401</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</originalsourceid><addsrcrecordid>eNpdkEtLw0AUhQdRsFZXLt0UV6Ikzp1nsiz1CRUL1fWQjHfSlDZTZxLEf29CxYWrexcf5xw-Qs6BpgA0v31ZLlJGqU41HJARSJklggp1OPyCJjrP-TE5iXFNKQOQ2YhcL71rv4qAk0XwLdq29s2kXQXfVavJtGnr5A7LrqrqpjolR67YRDz7vWPy_nD_NntK5q-Pz7PpPLEceJugzJR1gmpKC5tbyzjNrEXBpVDOOYVlKSyUH7qQgExpIZlQHIV2FjIpLR-Tq33uLvjPDmNrtnW0uNkUDfouGlAaWM4FhR69_IeufReafp3JgfXNUsgeutlDNvgYAzqzC_W2CN8GqBm0mV6bGbQZPURe7OkaEf9IwfptivIfS9Rmiw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912230545</pqid></control><display><type>magazinearticle</type><title>Software Protection through Anti-Debugging</title><source>IEEE Electronic Library (IEL)</source><creator>Gagnon, Michael N. ; Taylor, Stephen ; Ghosh, Anup K.</creator><creatorcontrib>Gagnon, Michael N. ; Taylor, Stephen ; Ghosh, Anup K.</creatorcontrib><description>This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2007.71</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>anti-debugging ; Computer bugs ; Computer hacking ; Computer information security ; Computer programs ; Computer security ; Debugging ; Hardware ; Humans ; Networks ; Operating systems ; Privacy ; Reverse engineering ; Security ; Software ; Software protection ; State of the art ; Strategy</subject><ispartof>IEEE security &amp; privacy, 2007-05, Vol.5 (3), p.82-84</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</citedby><cites>FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4218560$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4218560$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gagnon, Michael N.</creatorcontrib><creatorcontrib>Taylor, Stephen</creatorcontrib><creatorcontrib>Ghosh, Anup K.</creatorcontrib><title>Software Protection through Anti-Debugging</title><title>IEEE security &amp; privacy</title><addtitle>SECP-M</addtitle><description>This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.</description><subject>anti-debugging</subject><subject>Computer bugs</subject><subject>Computer hacking</subject><subject>Computer information security</subject><subject>Computer programs</subject><subject>Computer security</subject><subject>Debugging</subject><subject>Hardware</subject><subject>Humans</subject><subject>Networks</subject><subject>Operating systems</subject><subject>Privacy</subject><subject>Reverse engineering</subject><subject>Security</subject><subject>Software</subject><subject>Software protection</subject><subject>State of the art</subject><subject>Strategy</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2007</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNpdkEtLw0AUhQdRsFZXLt0UV6Ikzp1nsiz1CRUL1fWQjHfSlDZTZxLEf29CxYWrexcf5xw-Qs6BpgA0v31ZLlJGqU41HJARSJklggp1OPyCJjrP-TE5iXFNKQOQ2YhcL71rv4qAk0XwLdq29s2kXQXfVavJtGnr5A7LrqrqpjolR67YRDz7vWPy_nD_NntK5q-Pz7PpPLEceJugzJR1gmpKC5tbyzjNrEXBpVDOOYVlKSyUH7qQgExpIZlQHIV2FjIpLR-Tq33uLvjPDmNrtnW0uNkUDfouGlAaWM4FhR69_IeufReafp3JgfXNUsgeutlDNvgYAzqzC_W2CN8GqBm0mV6bGbQZPURe7OkaEf9IwfptivIfS9Rmiw</recordid><startdate>20070501</startdate><enddate>20070501</enddate><creator>Gagnon, Michael N.</creator><creator>Taylor, Stephen</creator><creator>Ghosh, Anup K.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20070501</creationdate><title>Software Protection through Anti-Debugging</title><author>Gagnon, Michael N. ; Taylor, Stephen ; Ghosh, Anup K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2007</creationdate><topic>anti-debugging</topic><topic>Computer bugs</topic><topic>Computer hacking</topic><topic>Computer information security</topic><topic>Computer programs</topic><topic>Computer security</topic><topic>Debugging</topic><topic>Hardware</topic><topic>Humans</topic><topic>Networks</topic><topic>Operating systems</topic><topic>Privacy</topic><topic>Reverse engineering</topic><topic>Security</topic><topic>Software</topic><topic>Software protection</topic><topic>State of the art</topic><topic>Strategy</topic><toplevel>online_resources</toplevel><creatorcontrib>Gagnon, Michael N.</creatorcontrib><creatorcontrib>Taylor, Stephen</creatorcontrib><creatorcontrib>Ghosh, Anup K.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security &amp; privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gagnon, Michael N.</au><au>Taylor, Stephen</au><au>Ghosh, Anup K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Software Protection through Anti-Debugging</atitle><jtitle>IEEE security &amp; privacy</jtitle><stitle>SECP-M</stitle><date>2007-05-01</date><risdate>2007</risdate><volume>5</volume><issue>3</issue><spage>82</spage><epage>84</epage><pages>82-84</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2007.71</doi><tpages>3</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1540-7993
ispartof IEEE security & privacy, 2007-05, Vol.5 (3), p.82-84
issn 1540-7993
1558-4046
language eng
recordid cdi_proquest_journals_912230545
source IEEE Electronic Library (IEL)
subjects anti-debugging
Computer bugs
Computer hacking
Computer information security
Computer programs
Computer security
Debugging
Hardware
Humans
Networks
Operating systems
Privacy
Reverse engineering
Security
Software
Software protection
State of the art
Strategy
title Software Protection through Anti-Debugging
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T20%3A52%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Software%20Protection%20through%20Anti-Debugging&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Gagnon,%20Michael%20N.&rft.date=2007-05-01&rft.volume=5&rft.issue=3&rft.spage=82&rft.epage=84&rft.pages=82-84&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2007.71&rft_dat=%3Cproquest_RIE%3E1671293401%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912230545&rft_id=info:pmid/&rft_ieee_id=4218560&rfr_iscdi=true