首页> 外文期刊>Journal of supercomputing >Hybrid emulation for bypassing anti-reversing techniques and analyzing malware
【24h】

Hybrid emulation for bypassing anti-reversing techniques and analyzing malware

机译:用于绕过防逆转技术和分析恶意软件的混合仿真

获取原文
获取原文并翻译 | 示例
           

摘要

Malware uses a variety of anti-reverse engineering techniques, which makes its analysis difficult. Dynamic analysis tools, e.g., debuggers, DBI (Dynamic Binary Instrumentation), and CPU emulators, do not provide both accuracy and convenience when analyzing complex malware, which utilizes diverse anti-reversing techniques. Debuggers are convenient, but are easily detected by anti-debugging techniques. DBI tools are better for bypassing anti-reversing techniques than debuggers, but cannot execute complex programs correctly. Emulators are not designed for precise malware analysis. To address the problem fundamentally, we developed a new approach completely different from the previous works. We present a new dynamic analysis scheme for malware, which includes automatic detection and evasion of various anti-reversing techniques. This approach combines a CPU simulator and actual code execution, i.e., machine instructions are simulated with the CPU simulator, whereas API functions are directly executed when they are called. In this method, the CPU simulator can precisely execute code without modifying the code chunks for trampolines. Moreover, our method takes advantage of the OS functionalities, including thread management or interrupt handling. We conducted experiments on 16 widely used protectors, which show that our method outperforms conventional tools: Pin, DynamoRIO, Apate, and OllyAdvanced. Our scheme can unpack 15 protectors and bypass the anti-debugging techniques associated with them.
机译:恶意软件使用各种防逆向工程技术,这使其分析困难。动态分析工具,例如,调试器,DBI(动态二进制仪器)和CPU仿真器,在分析复杂的恶意软件时,不提供精度和便利性,这利用不同的防逆转技术。调试器方便,但通过防调试技术很容易检测到。 DBI工具比调试器更好地绕过防逆转技术,但无法正确执行复杂的程序。仿真器不设计用于精确的恶意软件分析。为了从根本上解决问题,我们开发了一种与以前的作品完全不同的新方法。我们为恶意软件提出了一种新的动态分析方案,包括自动检测和避难的各种防逆转技术。该方法结合了CPU模拟器和实际代码执行,即用CPU模拟器模拟了机器指令,而API函数被调用时直接执行。在此方法中,CPU模拟器可以精确执行代码而不修改蹦床的代码块。此外,我们的方法利用了OS功能,包括线程管理或中断处理。我们对16种广泛使用的保护器进行了实验,表明我们的方法优于传统工具:PIN,Dynamorio,Apate和OllyAdving。我们的计划可以解开15个保护器并绕过与它们相关的防调试技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号