Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

Syztrust: State-aware fuzzing on trusted os designed for iot devices

Q Wang, B Chang, S Ji, Y Tian, X Zhang… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable
solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted …

NCScope: hardware-assisted analyzer for native code in android apps

H Zhou, S Wu, X Luo, T Wang, Y Zhou… - Proceedings of the 31st …, 2022 - dl.acm.org
More and more Android apps implement their functionalities in native code, so does
malware. Although various approaches have been designed to analyze the native code …

Framework for understanding intention-unbreakable malware

T Ji, B Fang, X Cui, Z Wang, P Liao, S Song - Science China Information …, 2023 - Springer
The anti-analysis technology of malware has always been the focus in the cyberspace
security field. As malware analysis techniques evolve, malware writers continually employ …

Hyperdbg: Reinventing hardware-assisted debugging

MS Karvandi, MH Gholamrezaei… - Proceedings of the …, 2022 - dl.acm.org
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …

Armor: Protecting Software Against Hardware Tracing Techniques

T Yue, F Zhang, Z Ning, P Wang, X Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Many modern processors have embedded hardware tracing techniques (eg, Intel Processor
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …

On the feasibility of malware unpacking via hardware-assisted loop profiling

B Cheng, EA Leal, H Zhang, J Ming - 32nd USENIX Security Symposium …, 2023 - usenix.org
Hardware Performance Counters (HPCs) are built-in registers of modern processors to
count the occurrences of various micro-architectural events. Measuring HPCs values is a …

An empirical study of smart contract decompilers

X Liu, B Hua, Y Wang, Z Pan - 2023 IEEE international …, 2023 - ieeexplore.ieee.org
Smart contract decompilers, converting smart contract bytecode into smart contract source
code, have been used extensively in many scenarios such as binary code analysis, reverse …

Attention! your copied data is under monitoring: a systematic study of clipboard usage in android apps

Y Chen, R Tang, C Zuo, X Zhang, L Xue, X Luo… - Proceedings of the 46th …, 2024 - dl.acm.org
Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and
paste text within the same app or across different apps. However, insufficient access control …

Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA

S Lee, Y Shin, M Choi, H Cho, JH Yi - Journal of Internet Technology, 2024 - jit.ndhu.edu.tw
A lot of the recently reported malware is equipped with the anti-analysis techniques (eg, anti-
emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay …