Target Program

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 186420 Experts worldwide ranked by ideXlab platform

Juan Caballero - One of the best experts on this subject based on the ideXlab platform.

  • SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification
    2015
    Co-Authors: David Urbina, Juan Caballero, Zhiqiang Lin, Ut Dallas
    Abstract:

    Abstract. Examining and modifying data of interest in the memory of a tar-get Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of mem-ory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SIGPATH. We have applied SIG-PATH to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger. Key words: Program data introspection, memory graph, game hacking

  • sigpath a memory graph based approach for Program data introspection and modification
    European Symposium on Research in Computer Security, 2014
    Co-Authors: David I Urbina, Yufei Gu, Juan Caballero
    Abstract:

    Examining and modifying data of interest in the memory of a Target Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of memory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SigPath. We have applied SigPath to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger.

David I Urbina - One of the best experts on this subject based on the ideXlab platform.

  • sigpath a memory graph based approach for Program data introspection and modification
    European Symposium on Research in Computer Security, 2014
    Co-Authors: David I Urbina, Yufei Gu, Juan Caballero
    Abstract:

    Examining and modifying data of interest in the memory of a Target Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of memory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SigPath. We have applied SigPath to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger.

Anton Khrustalyov - One of the best experts on this subject based on the ideXlab platform.

Yufei Gu - One of the best experts on this subject based on the ideXlab platform.

  • sigpath a memory graph based approach for Program data introspection and modification
    European Symposium on Research in Computer Security, 2014
    Co-Authors: David I Urbina, Yufei Gu, Juan Caballero
    Abstract:

    Examining and modifying data of interest in the memory of a Target Program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for Program data introspection and modification, which does not require source code, debugging symbols, or any API in the Target Program. It takes as input a sequence of memory snapshots taken while the Program executes, and produces a path signature, which can be used in different executions of the Program to efficiently locate and traverse the in-memory data structures where the data of interest is stored. We have implemented our approach in a tool called SigPath. We have applied SigPath to game hacking, building cheats for 10 popular real-time and turn-based games, and for memory forensics, recovering from snapshots the contacts a user has stored in four IM applications including Skype and Yahoo Messenger.

Giedrius Ziberkas - One of the best experts on this subject based on the ideXlab platform.

  • open promol an experimental language for Target Program modification
    2002
    Co-Authors: Vytautas Štuikys, Robertas Damaševičius, Giedrius Ziberkas
    Abstract:

    We present a new experimental scripting language Open PROMOL developed for: 1) delivering flexible means for representing wide range modifications of a Target Program, and 2) supporting white-box reuse for well-understood domains, such as hardware design. We evaluate the role of scripting and Program modification in the domain. We describe the syntax and semantics of the basic PROMOL functions. We discuss the capabilities of the language to perform Program modifications by widening, narrowing and isolating functionality. Examples of Program modification in VHDL and other languages are delivered.

  • open promol an experimental language for Target Program modification
    2002
    Co-Authors: Vytautas Štuikys, Robertas Damaševičius, Giedrius Ziberkas
    Abstract:

    We present a new experimental scripting language Open PROMOL developed for: 1) delivering flexible means for representing wide range modifications of a Target Program, and 2) supporting white-box reuse for well-understood domains, such as hardware design. We evaluate the role of scripting and Program modification in the domain. We describe the syntax and semantics of the basic PROMOL functions. We discuss the capabilities of the language to perform Program modifications by widening, narrowing and isolating functionality. Examples of Program modification in VHDL and other languages are delivered.