A novel dynamic analysis infrastructure to instrument untrusted execution flow across user-kernel spaces
Code instrumentation and hardware based event trapping are two primary approaches used in dynamic malware analysis systems. In this paper, we propose a new approach called Execution Flow Instrumentation (EFI) where the analyzer execution flow is interleaved with the target flow in user- and kernel-m...
Saved in:
Main Authors: | HONG, Jiaqi, DING, Xuhua |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5610 https://ink.library.smu.edu.sg/context/sis_research/article/6613/viewcontent/PID6498953.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Virtualization-based System Hardening against Untrusted Kernels
by: CHENG, Yueqiang
Published: (2014) -
KRover: A symbolic execution engine for dynamic kernel analysis
by: PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi, et al.
Published: (2023) -
A Multi-User Steganographic File System on Untrusted Shared Storage
by: HAN, Jin, et al.
Published: (2010) -
Efficient Virtualization-based Application Protection against Untrusted Operating System
by: CHENG, Yueqiang, et al.
Published: (2015) -
Virtualization based password protection against malware in untrusted operating systems
by: CHENG, Yueqiang, et al.
Published: (2012)