Malicious software is still a relevant threat occurring during day-to-day use of computers.
To slow down analysts, attackers employ obfuscation to their malware and gain access to computer systems by attacking software vulnerabilities. Consequently manufacturers built in-depth defenses into their operating systems.
In this thesis we identify and mitigate (1) a recent static obfuscation, (2) weaknesses of dynamic analysis tools, and (3) attacks on well-established anti-exploitation mechanisms.
«
Malicious software is still a relevant threat occurring during day-to-day use of computers.
To slow down analysts, attackers employ obfuscation to their malware and gain access to computer systems by attacking software vulnerabilities. Consequently manufacturers built in-depth defenses into their operating systems.
In this thesis we identify and mitigate (1) a recent static obfuscation, (2) weaknesses of dynamic analysis tools, and (3) attacks on well-established anti-exploitation mechanis...
»
Übersetzte Kurzfassung:
Bösartige Schadprogramme stellen eine Herausforderung beim Einsatz digitaler Systeme dar.
Zum Schutz ihrer Malware verwenden Angreifer Obfuskierung bevor sie sie durch das Ausnutzen von Security-Bugs platzieren. Zur Abmilderung hat die verteidigende Seite Schutzmechanismen in Betriebssysteme eingebaut.
Diese Arbeit analysiert und mitigiert (1) eine neuartige Technik zur Obfuskierung, (2) Schwachstellen dynamischer Analyse und (3) Schwachstellen in Schutzmechanismen gegen Security-Bugs.