04.07.2014 Views

시간 기반 키 생성 방식을 이용한 안티 디버깅 기법 - SERSC

시간 기반 키 생성 방식을 이용한 안티 디버깅 기법 - SERSC

시간 기반 키 생성 방식을 이용한 안티 디버깅 기법 - SERSC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

시간 기반 키 생성 방식을 이용한 안티 디버깅 기법<br />

참고문헌 [Reference]<br />

[1] T. Shields, Anti-Debugging – A Developers View, white paper, Veracode Inc., (2009)<br />

http://www.veracode.com/images/pdf/whitepaper_ antidebugging.pdf, accessed December 28, 2010<br />

[2] M. N. Gagnon, S. Taylor, and A. K. Ghosh, Software protection through anti-debugging, IEEE Security and<br />

Privacy, (2007), Vol. 5, pp. 82-84.<br />

[3] K. Oishi and T. Matsumoto, Self Destructive Tamper Response for Software Protection, ASIACCS’11 March<br />

(2011).<br />

[4] M. J. Kim, J. Y. Lee, H. Y Chang, S. J. Cho, M. K. Park, Y. S. Park, and P. A. Wilsey, Design and<br />

Performance Evaluation of Binary Code Packing for Protection Embedded Software against Reverse<br />

Enginneering, proc. IEEE 13th ISORC, May (2010).<br />

[5] J. Cappaert, B. Preneel, B. Anckaert, M. Madou, and K. D. Bosschere, Towards Tamper Resistant Code<br />

Encryption: Practice and Experience, proc. 4th Information Security practice and Experience Conference,<br />

Springer-Verlag, March (2008), pp. 160-175.<br />

[6] R. R. Branco, G. N. Barbosa, and P. D. Neto, Scientific but Not Academical Overview of Malware<br />

Anti-Debugging, Anti-Disassembly and Anti-VM Technologies, BlackHat,<br />

http://research.dissect.pe/docs/blackhat2012-paper.pdf, July (2012).<br />

[7] N. A. Quyng, and K. Suzaki, Virt-ICE: Next-generation Debugger for Malware Analysis, BlackHat Briefings<br />

USA, (2010).<br />

[8] J. H. Park, S. H. Kim, D. H. Lee, A Tamper Resistance Software Mechanism using MAC Function and<br />

Dynamic Link Key, Journal of The Korea Institute of Information Security and Cryptology 23-1, Feb.<br />

(2013).<br />

[9] Y. Kanzaki, and A. Monden, A Software Protection Method Based on Time-Sensitive Code and<br />

Self-Modefication Mechanism, proc. the Internationl Conference Software Engineering and Applications, Nov.<br />

8-10, (2010).<br />

[10] N. Metha, and S. C. Shiva, ELF Executable Encryptor. Secure Reality.<br />

http://www.securereality.com.au/<br />

[11] N. Falliere, Windows anti-debug reference,<br />

http://www.symantec.com/connect/ja/articles/windows-anti-debug-reference, (2007).<br />

302

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!