Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2018, Volume 30, Issue 3, Pages 87–92
DOI: https://doi.org/10.15514/ISPRAS-2018-30(3)-6
(Mi tisp326)
 

Stealth debugging of programs in Qemu emulator with WinDbg debugger

M. A. Abakumov, P. M. Dovgalyuk

Yaroslav-the-Wise Novgorod State University
References:
Abstract: When programs are analyzed for the presence of vulnerabilities and malicious code, there is a need for a quality isolation of the analysis tools. There are two reasons for this. At first, the program can influence the tool environment. This problem is solved by using the emulator. At second, the tool environment can influence behavior of the analyzed program. So, the programmer will think that the program is harmless, but in fact it is not. This problem is solved by the mechanism of stealth debugging. The WinDbg debugger has the possibility of connecting to a remote debug service (Kdsrv.exe) in the Windows kernel. Therefore, it is possible to connect to the guest system running in the QEMU emulator. Interaction between WinDbg client and server occurs through packets by protocol KDCOM. However, kernel debugging is possible only with the enabled debugging mode in boot settings. And it reveals the debugging process. We developed special module of WinDbg debugger for Qemu emulator. It is an alternative of the remote debugging service in the kernel. Thus, the debugger client tries to connect to the WinDbg server, but module intercepts all packets, generates all the necessary information from the Qemu emulator and sends response to the client. Module completely simulates the behavior of the server, so the client does not notice the spoofing and perfectly interacts with it. At the same time for debugging there is no need to enable debugging mode in the kernel. This leads to stealth debugging. Our module supports all features of WinDbg regarding remote debugging, besides interception of events and exceptions.
Keywords: WinDbg, Qemu, Windows, remote debugging, stealth debugging.
Funding agency Grant number
Ministry of Education and Science of the Russian Federation 2.6146.2017/8.9
The work was supported by the Ministry of Education and Science of Russia, research project No. 2.6146.2017/8.9.
Bibliographic databases:
Document Type: Article
Language: English
Citation: M. A. Abakumov, P. M. Dovgalyuk, “Stealth debugging of programs in Qemu emulator with WinDbg debugger”, Proceedings of ISP RAS, 30:3 (2018), 87–92
Citation in format AMSBIB
\Bibitem{AbaDov18}
\by M.~A.~Abakumov, P.~M.~Dovgalyuk
\paper Stealth debugging of programs in Qemu emulator with WinDbg debugger
\jour Proceedings of ISP RAS
\yr 2018
\vol 30
\issue 3
\pages 87--92
\mathnet{http://mi.mathnet.ru/tisp326}
\crossref{https://doi.org/10.15514/ISPRAS-2018-30(3)-6}
\elib{https://elibrary.ru/item.asp?id=35192495}
Linking options:
  • https://www.mathnet.ru/eng/tisp326
  • https://www.mathnet.ru/eng/tisp/v30/i3/p87
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:193
    Full-text PDF :151
    References:20
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024