作者: Monirul Sharif , Vinod Yegneswaran , Hassen Saidi , Phillip Porras , Wenke Lee
DOI: 10.1007/978-3-540-88313-5_31
关键词:
摘要: We introduce Eureka, a framework for enabling static analysis on Internet malware binaries. Eureka incorporates novel binary unpacking strategy based statistical bigram and coarse-grained execution tracing. The uniquely distinguishes itself from prior work by providing effective evaluation metrics techniques to assess the quality of produced unpacked code. provides several Windows API resolution that identify system calls in code overcoming various existing control flow obfuscations. Eureka's capabilities facilitate structural underlying logic means micro-ontology generation labels groupings identified their functionality. They enable visual understanding through automated construction annotated call graphs.Our multiple datasets reveals can simplify large fraction contemporary successfully deobfuscating references.