2017
DOI: 10.1016/j.cose.2017.07.006
|View full text |Cite
|
Sign up to set email alerts
|

Effectiveness of synthesis in concolic deobfuscation

Abstract: Control flow obfuscation techniques can be used to hinder software reverseengineering. Symbolic analysis can counteract these techniques, but only if they can analyze obfuscated conditional statements. We evaluate the use of dynamic synthesis to complement symbolic analysis in the analysis of obfuscated conditionals. We test this approach on the taint-analysis-resistant Mixed Boolean Arithmetics (MBA) obfuscation method that is commonly used to obfuscate and randomly diversify statements. We experimentally asc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
30
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(31 citation statements)
references
References 34 publications
1
30
0
Order By: Relevance
“…The work presented in [19], although based on binary execution traces, is a valid starting point to improve the detection of the dynamic opaque predicates in SATURN. While the work presented in [3] describes a strong simplification methodology based on the Drill&Join synthesis technique [1] which is orthogonal to the ones in SATURN and could further improve the MBA expressions handling. As discussed in Section 12, a plugin system would enable us to integrate these approaches during the exploration phase.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The work presented in [19], although based on binary execution traces, is a valid starting point to improve the detection of the dynamic opaque predicates in SATURN. While the work presented in [3] describes a strong simplification methodology based on the Drill&Join synthesis technique [1] which is orthogonal to the ones in SATURN and could further improve the MBA expressions handling. As discussed in Section 12, a plugin system would enable us to integrate these approaches during the exploration phase.…”
Section: Discussionmentioning
confidence: 99%
“…Effectiveness of Synthesis in Concolic Deobfuscation. Biondi et al summarize in [3] that SMT solvers alone are not efficient enough against MBA based obfuscation. As future work they proposed to study a tool that could drive the concolic execution of obfuscated programs by retrieving a compact representation of obfuscated constraints.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a consequence, several works focus on the deobfuscation of opaque predicates (e.g. [5,7,8,16,29,32,42]) in order to evaluate the quality of the obfuscated code rendered by this transformation. However, these techniques are often based on dynamic analysis and are therefore limited or not scalable.…”
Section: Introductionmentioning
confidence: 99%
“…Using a subfamily is a problem in the context of obfuscation since such polynomials will have an intrinsic form which can be recognized more easily and thus help the reverser. The attack proposed in [1] relies on this property.…”
Section: Introductionmentioning
confidence: 99%