Universiti Teknologi Malaysia Institutional Repository

In memory detection of Windows API call hooking technique

Mohd. Shaid, S. Z. and Maarof, M. A. (2015) In memory detection of Windows API call hooking technique. In: 2nd International Conference on Computer, Communications, and Control Technology, I4CT 2015, 21-23 Apr 2015, Kuching, Sarawak.

[img]
Preview
PDF
601kB

Abstract

API call hooking is a technique that malware researchers use to mine malware's API calls. These API calls is used to represent malware's behavior, for use in malware analysis, classification or detection of samples. In this paper, analysis of current Windows API call hooking techniques is presented where surprisingly, it was found that detection of each technique can be done trivially in memory. This could lead to malware being able to sense the presence of API call hooking techniques and modifying their behavior during runtime. Suggestions for a better API call hooking technique are presented towards the end of the paper.

Item Type:Conference or Workshop Item (Paper)
Uncontrolled Keywords:API cal, API hooking, malware
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:59317
Deposited By: Haliza Zainal
Deposited On:18 Jan 2017 01:50
Last Modified:14 Oct 2021 03:30

Repository Staff Only: item control page