Obfuscation resilient binary code reuse through trace-oriented programming

作者: Junyuan Zeng , Yangchun Fu , Kenneth A. Miller , Zhiqiang Lin , Xiangyu Zhang

DOI: 10.1145/2508859.2516664

关键词: SoftwareBinary codeProgramming languageComputer scienceMalwareObfuscation (software)Malware analysisStatic analysisUnreachable codeSource codeRedundant codeDead codeCode bloatTheoretical computer scienceStatic program analysisObfuscation

摘要: With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that …

参考文章(47)
David A. Molnar, Michael Y. Levin, Patrice Godefroid, Automated Whitebox Fuzz Testing. network and distributed system security symposium. ,(2008)
Monirul Sharif, Vinod Yegneswaran, Hassen Saidi, Phillip Porras, Wenke Lee, Eureka: A Framework for Enabling Static Malware Analysis european symposium on research in computer security. pp. 481- 500 ,(2008) , 10.1007/978-3-540-88313-5_31
Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song, Binary Code Extraction and Interface Identification for Security Applications network and distributed system security symposium. ,(2009) , 10.21236/ADA538737
Zhui Deng, Xiangyu Zhang, Dongyan Xu, BISTRO: Binary Component Extraction and Embedding for Software Security Applications european symposium on research in computer security. pp. 200- 218 ,(2013) , 10.1007/978-3-642-40203-6_12
Tal Garfinkel, Mendel Rosenblum, Kevin Christopher, Ben Pfaff, Jim Chow, Understanding data lifetime via whole system simulation usenix security symposium. pp. 22- 22 ,(2004)
Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh, A Study of the Packer Problem and Its Solutions recent advances in intrusion detection. pp. 98- 115 ,(2008) , 10.1007/978-3-540-87403-4_6
Jerome Miecznikowski, Laurie Hendren, Decompiling Java Bytecode: Problems, Traps and Pitfalls compiler construction. pp. 111- 127 ,(2002) , 10.1007/3-540-45937-5_10
Barton P. Miller, Justin E. Forrester, An empirical study of the robustness of Windows NT applications using random testing conference on usenix windows systems symposium. pp. 6- 6 ,(2000)
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Alan Mycroft, Type-Based Decompilation (or Program Reconstruction via Type Reconstruction) european symposium on programming. pp. 208- 223 ,(1999) , 10.1007/3-540-49099-X_14