The Experts below are selected from a list of 186420 Experts worldwide ranked by ideXlab platform
Juan Caballero - One of the best experts on this subject based on the ideXlab platform.
-
SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification
2015Co-Authors: David Urbina, Juan Caballero, Zhiqiang Lin, Ut DallasAbstract:Abstract. Examining and modifying data of interest in the memory of a tar-get Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of mem-ory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SIGPATH. We have applied SIG-PATH to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger. Key words: Program data introspection, memory graph, game hacking
-
sigpath a memory graph based approach for Program data introspection and modification
European Symposium on Research in Computer Security, 2014Co-Authors: David I Urbina, Yufei Gu, Juan CaballeroAbstract:Examining and modifying data of interest in the memory of a Target Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of memory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SigPath. We have applied SigPath to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger.
David I Urbina - One of the best experts on this subject based on the ideXlab platform.
-
sigpath a memory graph based approach for Program data introspection and modification
European Symposium on Research in Computer Security, 2014Co-Authors: David I Urbina, Yufei Gu, Juan CaballeroAbstract:Examining and modifying data of interest in the memory of a Target Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of memory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SigPath. We have applied SigPath to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger.
Anton Khrustalyov - One of the best experts on this subject based on the ideXlab platform.
-
the application of external fields to the manufacturing of novel dense composite master alloys and aluminum based nanocomposites
Metallurgical and Materials Transactions A-physical Metallurgy and Materials Science, 2015Co-Authors: Vladimir Promakhov, Artem A Averin, Anton Khrustalyov, Alexander B. Vorozhtsov, Javier Tamayo, Sergey Vorozhtsov, Dmitry G. EskinAbstract:the Ministry of Education and Science of the Russian Federation within the framework of the Federal Target Program. Agreement No. 14.578.21.0025 (Unique identifier RFMEFI 57814X0025). A.B. Vorozhtsov, S.A. Vorozhtsov, J. Tamayo and D.G. Eskin acknowledge financial support from the Exomet Project (which is co-funded by the European Commission in the 7th Framework Programme (contract FP7-NMP3-LA-2012-280421), by the European Space Agency and by the individual partner organizations).
-
the application of external fields to the manufacturing of novel dense composite master alloys and aluminum based nanocomposites
Metallurgical and Materials Transactions A-physical Metallurgy and Materials Science, 2015Co-Authors: Vladimir Promakhov, Artem A Averin, Anton Khrustalyov, Alexander B. Vorozhtsov, Javier Tamayo, Sergey Vorozhtsov, Dmitry G. EskinAbstract:the Ministry of Education and Science of the Russian Federation within the framework of the Federal Target Program. Agreement No. 14.578.21.0025 (Unique identifier RFMEFI 57814X0025). A.B. Vorozhtsov, S.A. Vorozhtsov, J. Tamayo and D.G. Eskin acknowledge financial support from the Exomet Project (which is co-funded by the European Commission in the 7th Framework Programme (contract FP7-NMP3-LA-2012-280421), by the European Space Agency and by the individual partner organizations).
Yufei Gu - One of the best experts on this subject based on the ideXlab platform.
-
sigpath a memory graph based approach for Program data introspection and modification
European Symposium on Research in Computer Security, 2014Co-Authors: David I Urbina, Yufei Gu, Juan CaballeroAbstract:Examining and modifying data of interest in the memory of a Target Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of memory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SigPath. We have applied SigPath to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger.
Giedrius Ziberkas - One of the best experts on this subject based on the ideXlab platform.
-
open promol an experimental language for Target Program modification
2002Co-Authors: Vytautas Štuikys, Robertas Damaševičius, Giedrius ZiberkasAbstract:We present a new experimental scripting language Open PROMOL developed for: 1) delivering flexible means for representing wide range modifications of a Target Program, and 2) supporting white-box reuse for well-understood domains, such as hardware design. We evaluate the role of scripting and Program modification in the domain. We describe the syntax and semantics of the basic PROMOL functions. We discuss the capabilities of the language to perform Program modifications by widening, narrowing and isolating functionality. Examples of Program modification in VHDL and other languages are delivered.
-
open promol an experimental language for Target Program modification
2002Co-Authors: Vytautas Štuikys, Robertas Damaševičius, Giedrius ZiberkasAbstract:We present a new experimental scripting language Open PROMOL developed for: 1) delivering flexible means for representing wide range modifications of a Target Program, and 2) supporting white-box reuse for well-understood domains, such as hardware design. We evaluate the role of scripting and Program modification in the domain. We describe the syntax and semantics of the basic PROMOL functions. We discuss the capabilities of the language to perform Program modifications by widening, narrowing and isolating functionality. Examples of Program modification in VHDL and other languages are delivered.