2010 17th Working Conference on Reverse Engineering 2010
DOI: 10.1109/wcre.2010.22
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Engineering Self-Modifying Code: Unpacker Extraction

Abstract: Abstract-An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or "packed") form; at runtime, an unpacker routine transforms this to the original executable form of the code, which is then executed. Most of the existing work on analysis of such programs focuses on detecting unpacking and extracting the unpacked code. However, this does not shed any light on the functionality of different portions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…First, Debray et al [13], [29] proposed a formalization of the semantics of self-unpacking code, and modeled the concept of execution phases. In their model, a phase involves all the executed instructions written by any of the previous phases.…”
Section: Related Workmentioning
confidence: 99%
“…First, Debray et al [13], [29] proposed a formalization of the semantics of self-unpacking code, and modeled the concept of execution phases. In their model, a phase involves all the executed instructions written by any of the previous phases.…”
Section: Related Workmentioning
confidence: 99%
“…An alternative static approach is to extract the portion of the bootstrap code that does the unpacking and use it to create an unpacker tool. A research prototype by Coogan et al makes strides towards automating this process, and Debray and Patel built an improved prototype that incorporates dynamic analysis to help better identify and extract the code that does the unpacking [Coogan et al 2009;Debray and Patel 2010]. Though promising, this approach has not yet been shown to work on a broad sample of real-world malware.…”
Section: Binary Code Extractionmentioning
confidence: 99%
“…Hence, the usage of software applications has become one of the corner stone of our lives. Obviously, all these applications rely on the correct functioning of software and hardware components [6]. According to Howard and LeBlanc [13], in the 1980s, application security was achieved through secure hardware, such as ATM terminals or set-top boxes.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, threats such as piracy, reverse engineering, and tampering have emerged. These threats are exacerbated by poorly protected software [5][6][7]. Therefore, it is important to have a thorough threat analysis as well as software protection schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation