首页> 外文会议>International Conference on Information and Communications Security >Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis
【24h】

Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis

机译:通过过程仿真和基于IL的程序分析来检测加密功能

获取原文

摘要

Malware often encrypts its malicious code and sensitive data to avoid static pattern detection, thus detecting encryption functions and extracting the encryption keys in a malware can be very useful in security analysis. However, it's a complicated process to automatically detect encryption functions among huge amount of binary code, and the main challenge is to keep high efficiency and accuracy at the same time. In this paper we propose an enhanced detection approach. First we designed a novel process level emulation technique to efficiently analyze binary code, which is less resource-consuming compared with full system emulation. Further, we conduct program partitioning and assembly-to-IL(intermediate language) translation on binary code to simplify the analysis. We applied our approach to sample programs using cryptographic libraries and custom implemented version of typical encryption algorithms, and showed that these routines can be detected efficiently. It is convenient for analysts to use our approach to deal with the encrypted data within malware automatically. Our approach also provides an extensible interface for analysts to add extra templates to detect other forms of functions besides encryption routines.
机译:恶意软件经常加密其恶意代码和敏感数据以避免静态模式检测,从而检测加密功能并在恶意软件中提取加密密钥在安全性分析中非常有用。但是,自动检测大量二进制代码中的加密功能,主要挑战是同时保持高效率和准确性的复杂过程。在本文中,我们提出了一种增强的检测方法。首先,我们设计了一种新颖的工艺级仿真技术,以有效地分析二进制代码,与完整的系统仿真相比减少资源。此外,我们对二进制代码进行程序分区和组装到IL(中间语言)转换,以简化分析。我们将我们的方法应用于使用加密库和典型加密算法的自定义实现版本的样本程序,并显示了可以有效地检测到这些例程。分析师很方便,使用我们的方法自动处理恶意软件中的加密数据。我们的方法还为分析师提供了一个可扩展的界面,以添加额外的模板以检测除加密例程之外的其他形式的功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号