...
首页> 外文期刊>Quality Control, Transactions >o-glasses: Visualizing X86 Code From Binary Using a 1D-CNN
【24h】

o-glasses: Visualizing X86 Code From Binary Using a 1D-CNN

机译:O眼镜:使用1D-CNN可视化二进制文件的X86代码

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Malicious document files used in targeted attacks often contain a small program called shellcode. It is often hard to prepare a runnable environment for dynamic analysis of these document files because they exploit specific vulnerabilities. In these cases, it is necessary to identify the position of the shellcode in each document file to analyze it. If the exploit code uses executable scripts such as JavaScript and Flash, it is not so hard to locate the shellcode. On the other hand, it is sometimes almost impossible to locate the shellcode when it does not contain any JavaScript or Flash but consists of native x86 code only. Binary fragment classification is often applied to visualize the location of regions of interest, and shellcode must contain at least a small fragment of x86 native code even if most of it is obfuscated, such as a decoder for the obfuscated body of the shellcode. In this paper, we propose a novel method, o-glasses, to visualize the shellcode by recognizing the x86 native code using a specially designed one-dimensional convolutional neural network (1d-CNN). The fragment size needs to be as small as the minimum size of the x86 native code in the whole shellcode. Our results show that a 16-instruction-sequence (approximately 48 bytes on average) is sufficient for the code fragment visualization. Our method, o-glasses (1d-CNN), outperforms other methods in that it recognizes x86 native code with a surprisingly high F-measure rate (about 99.95%).
机译:目标攻击中使用的恶意文档文件通常包含一个名为shellcode的小程序。通常很难为这些文档文件的动态分析准备一个可追加的环境,因为它们利用了特定的漏洞。在这些情况下,有必要识别每个文档文件中shellcode的位置以分析它。如果利用代码使用诸如JavaScript和Flash等可执行脚本,则查找shellcode并不难。另一方面,当它不包含任何JavaScript或Flash时,有时几乎不可能定位shellcode,而是仅由X86代码组成。通常应用二进制片段分类以可视化感兴趣区域的位置,即使大多数它被混淆,例如大多数用于ShellCode的混淆主体的解码器,Shellcode也必须至少包含x86本机代码的小片段。在本文中,我们提出了一种新颖的方法O眼镜,通过使用专门设计的一维卷积神经网络(1D-CNN)来识别X86天然代码来可视化ShellCode。片段大小需要在整个shellcode中的x86本机代码的最小大小小。我们的结果表明,代码片段可视化足以提供16指令序列(平均约48个字节)。我们的方法,O眼镜(1D-CNN),优于其他方法,因为它识别出令人惊讶的高F测量率(约99.95%)的X86原生代码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号