A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracing

Y Park, S Choi, UY Choi, H Jin, NHM Nor, Y Park - Scientific Reports, 2024 - nature.com
As IoT devices are being widely used, malicious code is increasingly appearing in Linux
environments. Sophisticated Linux malware employs various evasive techniques to deter …

HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware Tracing

Y Zhang, T Liu, Y Wang, Y Qi, K Ji, J Tang… - arXiv preprint arXiv …, 2024 - arxiv.org
Dynamic taint analysis (DTA), as a fundamental analysis technique, is widely used in
security, privacy, and diagnosis, etc. As DTA demands to collect and analyze massive taint …