Metamorphism as a Software Protection for Non-Malicious Code - Thomas E Dube - 書籍 - Biblioscholar - 9781249578918 - 2012年10月2日
カバー画像とタイトルが一致しない場合、正しいのはタイトルです

Metamorphism as a Software Protection for Non-Malicious Code


商品が入荷したらメールで通知を受け取る
プロフィールはありますか? ログイン
iMusicのウィッシュリストに追加

Publisher Marketing: The software protection community is always seeking new methods for defending their products from unwanted reverse engineering, tampering, and piracy. Most current protections are static. Once integrated, the program never modifies them. Being static makes them stationary instead of moving targets. This observation begs a question, "Why not incorporate self-modification as a defensive measure?" Metamorphism is a defensive mechanism used in modern, advanced malware programs. Although the main impetus for this protection in malware is to avoid detection from anti-virus signature scanners by changing the program's form, certain metamorphism techniques also serve as anti-disassembler and anti-debugger protections. For example, opcode shifting is a metamorphic technique to confuse the program disassembly, but malware modifies these shifts dynamically unlike current static approaches. This research assessed the performance overhead of a simple opcode-shifting metamorphic engine and evaluated the instruction reach of this particular metamorphic transform. In addition, dynamic subroutine reordering was examined. Simple opcode shifts take only a few nanoseconds to execute on modern processors and a few shift bytes can mangle several instructions in a program's disassembly. A program can reorder subroutines in a short span of time (microseconds). The combined effects of these metamorphic transforms thwarted advanced debuggers, which are key tools in the attacker's arsenal.

メディア 書籍     Paperback Book   (ソフトカバーで背表紙を接着した本)
リリース済み 2012年10月2日
ISBN13 9781249578918
出版社 Biblioscholar
ページ数 134
寸法 189 × 246 × 7 mm   ·   254 g

Mere med samme udgiver