Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation
dc.contributor.author | Soriano-Salvador, Enrique | |
dc.contributor.author | Guardiola Múzquiz, Gorka | |
dc.date.accessioned | 2023-11-13T07:34:31Z | |
dc.date.available | 2023-11-13T07:34:31Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Soriano-Salvador, E., Guardiola-Múzquiz, G. Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. J Comput Virol Hack Tech 19, 503–513 (2023). https://doi.org/10.1007/s11416-022-00458-7 | es |
dc.identifier.uri | https://hdl.handle.net/10115/25911 | |
dc.language.iso | eng | es |
dc.publisher | Springer | es |
dc.subject | Cybersecurity | es |
dc.subject | antianalysis | es |
dc.subject | antifrida | es |
dc.subject | malware | es |
dc.subject | evasion | es |
dc.title | Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation | es |
dc.type | info:eu-repo/semantics/article | es |
dc.identifier.doi | 10.1007/s11416-022-00458-7 | es |
dc.rights.accessRights | info:eu-repo/semantics/embargoedAccess | es |
Files in this item
This item appears in the following Collection(s)
-
Artículos de Revista [4552]
Los ítems de digital-BURJC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario