作者: Pongsin Poosankam , Zhenkai Liang , Dawn Song , Min Gyung Kang , David Brumley
DOI:
关键词:
摘要: Automatic analysis of malicious binaries is necessary in order to scale with the rapid development and recovery malware found wild. The results automatic are useful for creating defense systems understanding current capabilities attackers. We propose an approach dissection which can answer fundamental questions such as what behavior they exhibit, relationships between their inputs outputs, how attacker may be using binary. implement our a system called BitScope. At core BitScope allows us execute symbolic inputs. Executing reason about code paths without constraining particula r input value.