首页> 外文期刊>Journal of Information Recording >Efficient Automatic Original Entry Point Detection
【24h】

Efficient Automatic Original Entry Point Detection

机译:高效的自动原稿入口检测

获取原文
获取原文并翻译 | 示例
       

摘要

Malware authors employ sophisticated anti-reverse engineering techniques such as packing, encryption, polymorphism, etc. For a packed file, when launched, the packed executable will reconstruct the code of the original program. The OEP (Original Entry Point) is the address indicating the beginning point of the original code. Previous work or conventional unpacking tools provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In this paper, we present an efficient OEP detection scheme for x86 Windows environments. This scheme is designed to find exact one OEP by using three methods. First, we enhanced Isawa et al.'s work by examining branch instructions. Our second method is to track the system parameters relevant to the main function in stack memory to refine OEP candidates. Our third method is that we track the startup function calls to find the installation routine for exception handling. To evaluate feasibility, we implemented our algorithm and then conducted experiments on 16 commercial representative packers and 6 previous unpacking tools/schemes. Experimental results show that even though our scheme produces a single OEP candidate for each packed file, accuracy is the highest (up to 14 times higher than the previous work).
机译:恶意软件作者采用了复杂的反逆向工程技术,例如打包,加密,多态等。对于打包文件,启动后,打包的可执行文件将重构原始程序的代码。 OEP(原始入口点)是指示原始代码起点的地址。先前的工作或常规的拆包工具提供了一组较大的OEP候选,有时候选中缺少OEP。在本文中,我们提出了一种针对x86 Windows环境的有效OEP检测方案。此方案旨在通过使用三种方法来查找确切的一个OEP。首先,我们通过检查分支指令来增强Isawa等人的工作。我们的第二种方法是在堆栈存储器中跟踪与主要功能相关的系统参数,以优化OEP候选对象。我们的第三个方法是跟踪启动函数调用,以找到用于异常处理的安装例程。为了评估可行性,我们实施了算法,然后在16个有代表性的包装工和6个先前的拆箱工具/方案上进行了实验。实验结果表明,即使我们的方案为每个打包文件生成一个OEP候选文件,准确性也最高(比以前的工作高14倍)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号