2013
DOI: 10.1007/978-3-642-41284-4_7
|View full text |Cite
|
Sign up to set email alerts
|

API Chaser: Anti-analysis Resistant Malware Analyzer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(21 citation statements)
references
References 10 publications
0
21
0
Order By: Relevance
“…We used Win7sp1 as a guest OS of API Chaser for this experiment. The reason why we focus on these five techniques is that they appeared or became major after our paper was first published in 2013 [25]. So, these techniques represent new techniques for API Chaser and if we can precisely analyze the malware with these techniques with API Chaser, we can demonstrate that the design of API Chaser is possibly strong enough for analyzing futureemerging techniques.…”
Section: Synthetic Malware Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…We used Win7sp1 as a guest OS of API Chaser for this experiment. The reason why we focus on these five techniques is that they appeared or became major after our paper was first published in 2013 [25]. So, these techniques represent new techniques for API Chaser and if we can precisely analyze the malware with these techniques with API Chaser, we can demonstrate that the design of API Chaser is possibly strong enough for analyzing futureemerging techniques.…”
Section: Synthetic Malware Experimentsmentioning
confidence: 99%
“…The first version of this paper was published in 2013 [25]. We have mainly two advances with this paper, compared to the first one.…”
Section: Introductionmentioning
confidence: 97%
“…To overcome stolen code, as shown in Fig. 1 (c), Kawakoya et al [9] proposed a technique of tracking the movement of API code with taint analysis. Their technique sets taint tags on API code and tracks them by propagating the tags to identify the position of copied instructions.…”
Section: Api De-obfuscationmentioning
confidence: 99%
“…API Chaser [9] relates code with the API name before starting an analysis by setting taint tags containing the API name on the code. It then keeps track of its relationship by propagating the tags during its analysis.…”
Section: Other De-obfuscation Techniquesmentioning
confidence: 99%
“…API Chaser [14] is a malware analysis system that provides anti-analysis resistant API monitoring. This system incorporates numerous techniques to prevent malware from evading analysis.…”
Section: Related Workmentioning
confidence: 99%