A Reverse Engineering Tool that Directly Injects Shellcodes to the Code Caves in Portable Executable Files

dc.contributor.authorAcici, Koray
dc.contributor.authorUgurlu, Guney
dc.contributor.orcID0000-0002-3821-6419en_US
dc.contributor.researcherIDHDM-9910-2022en_US
dc.date.accessioned2023-09-15T07:39:28Z
dc.date.available2023-09-15T07:39:28Z
dc.date.issued2022
dc.description.abstractCode caves are used in cybersecurity and reverse engineering and describe the space in a PE file that consists of sequential and random unused or empty bytes. Malware writers and hackers design malwares to inject shellcode into these code caves and can create backdoors on computers through to the shellcodes they inject. Apart from malicious use, the benefits of injecting code into code caves should also be considered. When software developers develop new software, they can use code caves and code injection to make minor changes to the compiled software. With the reverse engineering tool we developed named CodeCaveInjection, we demonstrated how to inject shell codes with 2 different methods and made this process easier.en_US
dc.identifier.endpage45en_US
dc.identifier.isbn979-8-3503-3162-2en_US
dc.identifier.scopus2-s2.0-85147092681en_US
dc.identifier.startpage42en_US
dc.identifier.urihttp://hdl.handle.net/11727/10667
dc.identifier.wos000932842500006en_US
dc.language.isoengen_US
dc.relation.isversionof10.1109/ICTACSE50438.2022.10009732en_US
dc.relation.journal5th International Conference on Theoretical and Applied Computer Science and Engineering (ICTASCE)en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectReverse engineeringen_US
dc.subjectCode cavesen_US
dc.subjectShellcodesen_US
dc.subjectDirect injectionen_US
dc.subjectCode injectionen_US
dc.titleA Reverse Engineering Tool that Directly Injects Shellcodes to the Code Caves in Portable Executable Filesen_US
dc.typeConference Objecten_US

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: