A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms

NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …

Hyperdbg: Reinventing hardware-assisted debugging

MS Karvandi, MH Gholamrezaei… - Proceedings of the …, 2022 - dl.acm.org
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …

Detection, traceability, and propagation of mobile malware threats

L Chen, C Xia, S Lei, T Wang - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the application of smartphones, Android operating systems and mobile
applications have become more prevalent worldwide. To study the traceability, propagation …

A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracing

Y Park, S Choi, UY Choi, H Jin, NHM Nor, Y Park - Scientific Reports, 2024 - nature.com
As IoT devices are being widely used, malicious code is increasingly appearing in Linux
environments. Sophisticated Linux malware employs various evasive techniques to deter …

JPortal: Precise and efficient control-flow tracing for JVM programs with Intel Processor Trace

Z Zuo, K Ji, Y Wang, W Tao, L Wang, X Li… - Proceedings of the 42nd …, 2021 - dl.acm.org
Hardware tracing modules such as Intel Processor Trace perform continuous control-flow
tracing of an end-to-end program execution with an ultra-low overhead. PT has been used in …

Active and passive virtual machine introspection on AMD and ARM processors

T Dangl, S Sentanoe, HP Reiser - Journal of Systems Architecture, 2024 - Elsevier
Active and passive virtual machine introspection mechanisms are pivotal for monitoring
virtual machines on top of a hypervisor. They enable external tools to monitor and inspect …

Improving transparency of hardware breakpoints with virtual machine introspection

M Sato, R Nakamura, T Yamauchi… - … on Advanced Applied …, 2022 - ieeexplore.ieee.org
Hardware breakpoints are used to monitor the behavior of a program on a virtual machine
(VM). Although a virtual machine monitor (VMM) can inspect programs on a VM at hardware …

HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)

MS Karvandi, MH Gholamrezaei, SK Monfared… - arXiv preprint arXiv …, 2022 - arxiv.org
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …

[PDF][PDF] VMIaaS: Virtual Machine Introspection as a Service

S Sentanoe - 2024 - opus4.kobv.de
In this digital era, communication in the digital world is becoming part of our daily lives. One
key technology that becomes part of this digital transformation is cloud computing. It allows …

BAHK: flexible automated binary analysis method with the assistance of hardware and system kernel

J Pan, Y Zhuang, B Sun - Security and Communication …, 2020 - Wiley Online Library
To protect core functions, applications often utilize the countermeasure techniques such as
antidebugging to avoid analysis by outsiders, especially the malware. Dynamic binary …