Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation
dc.contributor.author | Soriano-Salvador, Enrique | |
dc.contributor.author | Guardiola Múzquiz, Gorka | |
dc.date.accessioned | 2023-11-13T07:34:31Z | |
dc.date.available | 2023-11-13T07:34:31Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Soriano-Salvador, E., Guardiola-Múzquiz, G. Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. J Comput Virol Hack Tech 19, 503–513 (2023). https://doi.org/10.1007/s11416-022-00458-7 | es |
dc.identifier.doi | 10.1007/s11416-022-00458-7 | es |
dc.identifier.uri | https://hdl.handle.net/10115/25911 | |
dc.language.iso | eng | es |
dc.publisher | Springer | es |
dc.rights.accessRights | info:eu-repo/semantics/embargoedAccess | es |
dc.subject | Cybersecurity | es |
dc.subject | antianalysis | es |
dc.subject | antifrida | es |
dc.subject | malware | es |
dc.subject | evasion | es |
dc.title | Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation | es |
dc.type | info:eu-repo/semantics/article | es |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- 2023-frida-bypass-repositorio.pdf
- Tamaño:
- 978.08 KB
- Formato:
- Adobe Portable Document Format
- Descripción:
- article
Bloque de licencias
1 - 1 de 1
No hay miniatura disponible
- Nombre:
- license.txt
- Tamaño:
- 2.67 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: