2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS) 2019
DOI: 10.1109/iceccs.2019.00008
|View full text |Cite
|
Sign up to set email alerts
|

LTL Model Checking of Self Modifying Code

Abstract: Self modifying code is code that can modify its own instructions during the execution of the program. It is extensively used by malware writers to obfuscate their malicious code. Thus, analysing self modifying code is nowadays a big challenge. In this paper, we consider the LTL model-checking problem of self modifying code. We model such programs using self-modifying pushdown systems (SM-PDS), an extension of pushdown systems that can modify its own set of transitions during execution. We reduce the LTL model-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…As for LTL and CTL modelchecking, they can be reduced to the emptiness problem for Selfmodifying (Alternating) Büchi Pushdown Systems. The basic idea is to make a product of the given SM-PDS and the given LTL or CTL formula to get a Self-modifying (Alternating) Büchi Pushdown system and then apply the algorithms of [43] to check the emptiness of the Self-modifying (Alternating) Büchi Pushdown system.…”
Section: The Model Checking Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations
“…As for LTL and CTL modelchecking, they can be reduced to the emptiness problem for Selfmodifying (Alternating) Büchi Pushdown Systems. The basic idea is to make a product of the given SM-PDS and the given LTL or CTL formula to get a Self-modifying (Alternating) Büchi Pushdown system and then apply the algorithms of [43] to check the emptiness of the Self-modifying (Alternating) Büchi Pushdown system.…”
Section: The Model Checking Algorithmsmentioning
confidence: 99%
“…For example, we show in this section how LTL can be used to express the malicious behavior of registry key injecting. Other LTL and CTL formulas that describe other malicious behaviors can be found in [13,14,43].…”
Section: Applying Smodic For Malware Detectionmentioning
confidence: 99%
See 2 more Smart Citations