首页> 外文会议>17th ACM conference on computer and communications security 2010 >Mimimorphism: A New Approach to Binary Code Obfuscation
【24h】

Mimimorphism: A New Approach to Binary Code Obfuscation

机译:同构:二进制代码混淆的新方法

获取原文
获取原文并翻译 | 示例

摘要

Binary obfuscation plays an essential role in evading malware static analysis and detection. The widely used code obfuscation techniques, such as polymorphism and metamorphism, focus on evading syntax based detection. However, statistic test and semantic analysis techniques have been developed to thwart their evasion attempts. More recent binary obfuscation techniques are divided in their purposes of attacking either statistical or semantic approach, but not both. In this paper, we introduce mimimorphism, a novel binary obfuscation technique with the potential of evading both statistical and semantic detections. Mimimorphic malware uses instruction-syntax-aware high-order mimic functions to transform its binary into mimicry executables that exhibit high similarity to benign programs in terms of statistical properties and semantic characteristics. We implement a prototype of the mimimorphic engine on the Intel x86 platform, and evaluate its capability of evading statistical anomaly detection and semantic analysis detection techniques. Our experimental results demonstrate that the mimicry executables are indistinguishable from benign programs in terms of byte frequency distribution and entropy, as well as control flow fingerprint.
机译:二进制混淆在逃避恶意软件静态分析和检测中起着至关重要的作用。广泛使用的代码混淆技术(例如多态和变质)专注于规避基于语法的检测。但是,已经开发了统计测试和语义分析技术来阻止其逃避尝试。较新的二进制混淆技术在攻击统计方法或语义方法的目的上有所不同,但不能同时攻击两者。在本文中,我们介绍了拟态,一种新的二进制混淆技术,具有逃避统计和语义检测的潜力。拟态恶意软件使用可感知指令语法的高阶拟态函数将其二进制文件转换成拟态可执行文件,这些可执行文件在统计特性和语义特征方面与良性程序具有高度相似性。我们在Intel x86平台上实现了模拟引擎的原型,并评估了其规避统计异常检测和语义分析检测技术的能力。我们的实验结果表明,在字节频率分布和熵以及控制流指纹方面,模仿可执行文件与良性程序没有区别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号