Binglin Sun
YOU?
Author Swipe
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel Open
To protect core functions, applications often utilize the countermeasure techniques such as antidebugging to avoid analysis by outsiders, especially the malware. Dynamic binary instrumentation is commonly used in the analysis of binary pro…
Lightweight and Efficient Hypervisor-Based Dynamic Binary Instrumentation and Analysis Method Open
At present, various vulnerabilities and malicious programs are still constantly threatening the system security, and in-depth analysis of legitimate applications and malicious code is an important link of security defense under the current…
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs Open
Many famous attacks take web browsers as transmission channels to make the target computer infected by malwares, such as watering hole and domain name hijacking. In order to protect the data transmission, the SSL/TLS protocol has been wide…
Consortium Blockchain-Based Malware Detection in Mobile Devices Open
To address the problem of detecting malicious codes in malware and extracting the corresponding evidences in mobile devices, we construct a consortium blockchain framework, which is composed of a detecting consortium chain shared by test m…