Malicious software is still a relevant threat occurring during day-to-day use of computers.
To slow down analysts, attackers employ obfuscation to their malware and gain access to computer systems by attacking software vulnerabilities. Consequently manufacturers built in-depth defenses into their operating systems.
In this thesis we identify and mitigate (1) a recent static obfuscation, (2) weaknesses of dynamic analysis tools, and (3) attacks on well-established anti-exploitation mechanisms.
«
Malicious software is still a relevant threat occurring during day-to-day use of computers.
To slow down analysts, attackers employ obfuscation to their malware and gain access to computer systems by attacking software vulnerabilities. Consequently manufacturers built in-depth defenses into their operating systems.
In this thesis we identify and mitigate (1) a recent static obfuscation, (2) weaknesses of dynamic analysis tools, and (3) attacks on well-established anti-exploitation mechanis...
»