首页> 外文会议>IEEE international conference on secure integration and reliability improvement >ReconBin: Reconstructing Binary File from Execution for Software Analysis
【24h】

ReconBin: Reconstructing Binary File from Execution for Software Analysis

机译:重新签署:从执行中重建二进制文件进行软件分析

获取原文

摘要

Static analysis is one of the most popular approaches of software analysis. As more and more software protects their code by transformation or encryption, then releases them at runtime dynamically, it is hard to statically analyze these protected executables because of the failure of disassembling. In this paper, we propose a novel and general technique to reconstruct binary files for static analysis by monitoring the executions of protected executables. Our approach can identify and extract the dynamically released code at runtime, and at the same time record the control transfers information, and then reconstruct a binary file based on the original executable. The whole process does not depend on any prior knowledge on the protection methods. Experiments on our prototype ReconBin show that our approach can properly reconstruct the executables protected by SMC and packers, and the reconstructed binary files can be successfully analyzed by static analysis tools such as IDA Pro. We show that it also can be used to analyze the code dynamically generated by virtual machines, emulators, and buffer overflow attacks, which also dynamically inject attack code into stack and direct execution flow to it.
机译:静态分析是软件分析最受欢迎的方法之一。随着越来越多的软件通过转换或加密保护其代码,然后动态地在运行时释放它们,由于拆卸失败,难以静态分析这些受保护的可执行文件。在本文中,我们提出了一种通过监控受保护的可执行文件的执行来重建静态分析的新颖和一般技术。我们的方法可以在运行时识别和提取动态发布的代码,同时记录控制传输信息,然后基于原始可执行文件重建二进制文件。整个过程不依赖于对保护方法的任何先前知识。我们的原型重建实验表明,我们的方法可以正确地重建由SMC和包装器保护的可执行文件,并且可以通过静态分析工具(如IDA Pro)成功分析重建的二进制文件。我们还表明它也可用于分析虚拟机,仿真器和缓冲区溢出攻击动态生成的代码,该漏洞也将攻击代码动态注入堆栈并直接执行流到它。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号