TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Stack Necromancy: Defeating Debuggers by Raising the Dead

39 点作者 2510c39011c5大约 10 年前

2 条评论

spydum大约 10 年前
so if i understood, when you launch processes in a debugger, it will walk the list of functions and instantiate them.. this means you could craft a bit of cleverness to detect whether app was launched from a debugger with minimal overhead, by tripping up an uninitiated pointer.<p>none of this works for debuggers which attach AFTER the process starts though.. so if I were a MALware creator, this might be a handy trick to force different code paths while someone is snooping my newest creation. the only way to know it was going on would be to do a static analysis (which i imagine, is more effort).
评论 #9329544 未加载
SomeCallMeTim大约 10 年前
My history is with CPUs that don&#x27;t have a separate system stack, so my first thought was that interrupts could stomp on the stack. But not so on Intel.