首页> 外文会议>Asia Joint Conference on Information Security >Comparing Malware Samples for Unpacking: A Feasibility Study
【24h】

Comparing Malware Samples for Unpacking: A Feasibility Study

机译:比较恶意软件样本以进行拆包:可行性研究

获取原文

摘要

When an analyst examines the binary of malware to obtain some useful information for defense and mitigation, she is often required to extract its original binary first. Packing is the reason of this. Usually, malware authors pack (encrypt and/or compress) their malware to hinder code analysis, making it necessary for analysts to spend a great deal of time on unpacking. Towards effective malware analysis, this paper presents an automated original-entry-point detector called OEPdet. If the original entry point (OEP) of malware is found after the malware is executed, an analyst can smoothly begin to examine the original binary starting at the OEP. OEPdet takes as input two malware samples to find part of the original binary shared between those samples. It then detects the OEP based on that shared binary. This is based on the fact that many malware samples are often generated with a variety of source code shared with others at function or snippet granularity. The experiments using some malware samples confirm OEPdet is feasible to detect the OEP.
机译:当分析人员检查恶意软件的二进制文件以获得一些有用的信息以进行防御和缓解时,通常需要她首先提取其原始二进制文件。包装是造成这种情况的原因。通常,恶意软件作者打包(加密和/或压缩)他们的恶意软件会阻碍代码分析,这使得分析师有必要花费大量时间进行解压缩。为了进行有效的恶意软件分析,本文提出了一种称为OEPdet的自动原始入口检测器。如果在执行恶意软件后找到了恶意软件的原始入口点(OEP),则分析人员可以从OEP开始平稳地检查原始二进制文件。 OEPdet将两个恶意软件样本作为输入,以查找这些样本之间共享的原始二进制文件的一部分。然后,它基于该共享二进制文件检测OEP。这是基于以下事实:许多恶意软件样本通常是通过功能或代码段粒度与他人共享的各种源代码生成的。使用一些恶意软件样本进行的实验证实了OEPdet对于检测OEP是可行的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号