A Survey on Function and System Call Hooking Approaches
- 1 June 2017
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 1 (2), 114-136
- https://doi.org/10.1007/s41635-017-0013-2
Abstract
No abstract availableKeywords
Funding Information
- National Science Foundation (NSF-CAREER-CNS-1453647)
- U.S. Department of Energy (US DOE DE-OE0000779)
- National Science Foundation (US NSF-REU-CNS-1461119)
This publication has 21 references indexed in Scilit:
- In memory detection of Windows API call hooking techniquePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Design and implementation of an Android host-based intrusion prevention systemPublished by Association for Computing Machinery (ACM) ,2014
- Persistent Data-only Malware: Function Hooks without CodePublished by Internet Society ,2014
- FireDroidPublished by Association for Computing Machinery (ACM) ,2013
- ANANAS - A Framework for Analyzing Android ApplicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- AppGuard – Enforcing User Requirements on Android AppsLecture Notes in Computer Science, 2013
- BitBlaze: A New Approach to Computer Security via Binary AnalysisLecture Notes in Computer Science, 2008
- IMDSPublished by Association for Computing Machinery (ACM) ,2007
- NetHost-sensor: Monitoring a target host's application via system callsInformation Security Technical Report, 2006
- LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO 2007), 2006