Software Protection through Anti-Debugging
This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there a...
Gespeichert in:
Veröffentlicht in: | IEEE security & privacy 2007-05, Vol.5 (3), p.82-84 |
---|---|
Hauptverfasser: | , , |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 84 |
---|---|
container_issue | 3 |
container_start_page | 82 |
container_title | IEEE security & privacy |
container_volume | 5 |
creator | Gagnon, Michael N. Taylor, Stephen Ghosh, Anup K. |
description | This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance. |
doi_str_mv | 10.1109/MSP.2007.71 |
format | Magazinearticle |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_912230545</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4218560</ieee_id><sourcerecordid>1671293401</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</originalsourceid><addsrcrecordid>eNpdkEtLw0AUhQdRsFZXLt0UV6Ikzp1nsiz1CRUL1fWQjHfSlDZTZxLEf29CxYWrexcf5xw-Qs6BpgA0v31ZLlJGqU41HJARSJklggp1OPyCJjrP-TE5iXFNKQOQ2YhcL71rv4qAk0XwLdq29s2kXQXfVavJtGnr5A7LrqrqpjolR67YRDz7vWPy_nD_NntK5q-Pz7PpPLEceJugzJR1gmpKC5tbyzjNrEXBpVDOOYVlKSyUH7qQgExpIZlQHIV2FjIpLR-Tq33uLvjPDmNrtnW0uNkUDfouGlAaWM4FhR69_IeufReafp3JgfXNUsgeutlDNvgYAzqzC_W2CN8GqBm0mV6bGbQZPURe7OkaEf9IwfptivIfS9Rmiw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912230545</pqid></control><display><type>magazinearticle</type><title>Software Protection through Anti-Debugging</title><source>IEEE Electronic Library (IEL)</source><creator>Gagnon, Michael N. ; Taylor, Stephen ; Ghosh, Anup K.</creator><creatorcontrib>Gagnon, Michael N. ; Taylor, Stephen ; Ghosh, Anup K.</creatorcontrib><description>This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2007.71</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>anti-debugging ; Computer bugs ; Computer hacking ; Computer information security ; Computer programs ; Computer security ; Debugging ; Hardware ; Humans ; Networks ; Operating systems ; Privacy ; Reverse engineering ; Security ; Software ; Software protection ; State of the art ; Strategy</subject><ispartof>IEEE security & privacy, 2007-05, Vol.5 (3), p.82-84</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</citedby><cites>FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4218560$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4218560$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gagnon, Michael N.</creatorcontrib><creatorcontrib>Taylor, Stephen</creatorcontrib><creatorcontrib>Ghosh, Anup K.</creatorcontrib><title>Software Protection through Anti-Debugging</title><title>IEEE security & privacy</title><addtitle>SECP-M</addtitle><description>This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.</description><subject>anti-debugging</subject><subject>Computer bugs</subject><subject>Computer hacking</subject><subject>Computer information security</subject><subject>Computer programs</subject><subject>Computer security</subject><subject>Debugging</subject><subject>Hardware</subject><subject>Humans</subject><subject>Networks</subject><subject>Operating systems</subject><subject>Privacy</subject><subject>Reverse engineering</subject><subject>Security</subject><subject>Software</subject><subject>Software protection</subject><subject>State of the art</subject><subject>Strategy</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2007</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNpdkEtLw0AUhQdRsFZXLt0UV6Ikzp1nsiz1CRUL1fWQjHfSlDZTZxLEf29CxYWrexcf5xw-Qs6BpgA0v31ZLlJGqU41HJARSJklggp1OPyCJjrP-TE5iXFNKQOQ2YhcL71rv4qAk0XwLdq29s2kXQXfVavJtGnr5A7LrqrqpjolR67YRDz7vWPy_nD_NntK5q-Pz7PpPLEceJugzJR1gmpKC5tbyzjNrEXBpVDOOYVlKSyUH7qQgExpIZlQHIV2FjIpLR-Tq33uLvjPDmNrtnW0uNkUDfouGlAaWM4FhR69_IeufReafp3JgfXNUsgeutlDNvgYAzqzC_W2CN8GqBm0mV6bGbQZPURe7OkaEf9IwfptivIfS9Rmiw</recordid><startdate>20070501</startdate><enddate>20070501</enddate><creator>Gagnon, Michael N.</creator><creator>Taylor, Stephen</creator><creator>Ghosh, Anup K.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20070501</creationdate><title>Software Protection through Anti-Debugging</title><author>Gagnon, Michael N. ; Taylor, Stephen ; Ghosh, Anup K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-e586cf40700ac9cc2308cce43546fff6ebb4c1bd7a51e267452463e47fc1855c3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2007</creationdate><topic>anti-debugging</topic><topic>Computer bugs</topic><topic>Computer hacking</topic><topic>Computer information security</topic><topic>Computer programs</topic><topic>Computer security</topic><topic>Debugging</topic><topic>Hardware</topic><topic>Humans</topic><topic>Networks</topic><topic>Operating systems</topic><topic>Privacy</topic><topic>Reverse engineering</topic><topic>Security</topic><topic>Software</topic><topic>Software protection</topic><topic>State of the art</topic><topic>Strategy</topic><toplevel>online_resources</toplevel><creatorcontrib>Gagnon, Michael N.</creatorcontrib><creatorcontrib>Taylor, Stephen</creatorcontrib><creatorcontrib>Ghosh, Anup K.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security & privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gagnon, Michael N.</au><au>Taylor, Stephen</au><au>Ghosh, Anup K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Software Protection through Anti-Debugging</atitle><jtitle>IEEE security & privacy</jtitle><stitle>SECP-M</stitle><date>2007-05-01</date><risdate>2007</risdate><volume>5</volume><issue>3</issue><spage>82</spage><epage>84</epage><pages>82-84</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>This article focuses on describing state-of-the-art attacks on debuggers to prevent reverse engineering. You can use the information we present as part of your strategy to protect your software or to assist you in overcoming the anti-debugging tricks present in malicious software. Currently, there are enough anti-debugging techniques available to software engineers to sufficiently protect software against most threats, likewise, most state-of-the-art malware can be sufficiently reverse-engineered with patience and skill to enable security researchers to continue to defend their networks. However, advances in software protection techniques and reverse engineering might alter the balance.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2007.71</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1540-7993 |
ispartof | IEEE security & privacy, 2007-05, Vol.5 (3), p.82-84 |
issn | 1540-7993 1558-4046 |
language | eng |
recordid | cdi_proquest_journals_912230545 |
source | IEEE Electronic Library (IEL) |
subjects | anti-debugging Computer bugs Computer hacking Computer information security Computer programs Computer security Debugging Hardware Humans Networks Operating systems Privacy Reverse engineering Security Software Software protection State of the art Strategy |
title | Software Protection through Anti-Debugging |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T20%3A52%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Software%20Protection%20through%20Anti-Debugging&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Gagnon,%20Michael%20N.&rft.date=2007-05-01&rft.volume=5&rft.issue=3&rft.spage=82&rft.epage=84&rft.pages=82-84&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2007.71&rft_dat=%3Cproquest_RIE%3E1671293401%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912230545&rft_id=info:pmid/&rft_ieee_id=4218560&rfr_iscdi=true |