首页> 外文会议>International conference on detection of intrusions and malware, and vulnerability assessment >Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
【24h】

Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries

机译:寒鸦:实现大型二进制数据集的自动逆向工程

获取原文

摘要

When analyzing an untrusted binary, reverse engineers usually rely on ad-hoc collections of interesting dynamic patterns-known as behaviors in the malware-analysis community-and static patterns-known as signatures in the antivirus community. Such patterns are often part of the skill set of the analyst, sometimes implemented in manually-created post-processing scripts. It would be desirable to be able to automatically find such behaviors, present them to analysts, and create a systematic catalog of matching rules and relevant implementations. We propose Jackdaw, a system that finds interesting dynamic patterns, and ranks them to unveil potentially interesting behaviors. Then, it annotates them with static information, capturing the distinct implementations of each across different malware families. Finally, Jackdaw associates semantic information to the behaviors, so as to create a descriptive summary that helps the analysts in querying the catalog of behaviors by type. To do this, it leverages the dynamic information and an indexed Web-based knowledge databases. We implement and demonstrate Jackdaw on the Win32 API (even if the technique can be generalized to any OS). On a dataset of 2,136 distinct binaries, including both malicious and benign libraries and exe-cutables, we compared the behaviors extracted automatically against a ground truth of 44 behaviors created manually by expert analysts. Jackdaw found 77.3 % of them and was able to exclude spurious behaviors in 99.6 % cases. We also discovered 466 novel behaviors, among which manual exploration and review by expert reverse engineers revealed interesting findings and confirmed the correctness of the semantic tagging.
机译:在分析不受信任的二进制文件时,反向工程师通常依赖于有趣的动态模式的临时集合(称为恶意软件分析社区中的行为)和静态模式(称为防病毒社区中的签名)。这种模式通常是分析人员技能的一部分,有时以手动创建的后处理脚本来实现。希望能够自动发现此类行为,将其呈现给分析人员,并创建一个匹配规则和相关实现的系统目录。我们建议使用Jackdaw,该系统可以找到有趣的动态模式,并对它们进行排序,以揭示潜在的有趣行为。然后,它用静态信息注释它们,捕获跨不同恶意软件家族的每种实现的不同实现。最后,Jackdaw将语义信息与行为相关联,以创建描述性摘要,以帮助分析人员按类型查询行为目录。为此,它利用了动态信息和基于索引的基于Web的知识数据库。我们在Win32 API上实现并演示了Jackdaw(即使该技术可以推广到任何OS)。在包含恶意和良性库以及可执行文件的2136种不同二进制文件的数据集上,我们将自动提取的行为与专家分析师手动创建的44种行为的基本事实进行了比较。 Jackdaw发现了其中的77.3%,并且能够在99.6%的情况下排除虚假行为。我们还发现了466种新颖的行为,其中反向专家的手动探索和审查揭示了有趣的发现,并证实了语义标记的正确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号