Hacker News new | past | comments | ask | show | jobs | submit login
Stack Necromancy: Defeating Debuggers by Raising the Dead (spareclockcycles.org)
39 points by 2510c39011c5 on April 6, 2015 | hide | past | favorite | 3 comments



so if i understood, when you launch processes in a debugger, it will walk the list of functions and instantiate them.. this means you could craft a bit of cleverness to detect whether app was launched from a debugger with minimal overhead, by tripping up an uninitiated pointer.

none of this works for debuggers which attach AFTER the process starts though.. so if I were a MALware creator, this might be a handy trick to force different code paths while someone is snooping my newest creation. the only way to know it was going on would be to do a static analysis (which i imagine, is more effort).


Static analysis can be much more difficult, and there's a whole different toolbox for defeating static analysis. Often disassemblers can be attacked directly.


My history is with CPUs that don't have a separate system stack, so my first thought was that interrupts could stomp on the stack. But not so on Intel.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: