2009 6th International Workshop on Visualization for Cyber Security 2009
DOI: 10.1109/vizsec.2009.5375539
|View full text |Cite
|
Sign up to set email alerts
|

Visualizing compiled executables for malware analysis

Abstract: Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that represent the overall flow of a program. Most of the steps involve finding interesting areas of an executable and determining their overall functionality. This paper presents a method using dynamic analysis of program execution to visually represent the overall flow of a program. We use the Ether hypervisor framework to covertly monitor a progr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(33 citation statements)
references
References 8 publications
0
32
0
1
Order By: Relevance
“…Vera [17] allows to represent graphically the execution trace of a binary at the basic block level. Unfortunately, it is not clear if this granularity is useful in presence of very complex packers that involve multiple unpacking layers and the interaction between several processes.…”
Section: Packer Visualizationmentioning
confidence: 99%
“…Vera [17] allows to represent graphically the execution trace of a binary at the basic block level. Unfortunately, it is not clear if this granularity is useful in presence of very complex packers that involve multiple unpacking layers and the interaction between several processes.…”
Section: Packer Visualizationmentioning
confidence: 99%
“…Existing approaches [8], [9], [11], [30], [55]- [57] use graph-based representation to capture malicious programs. The authors in [55], [56] have presented a visualization approach to cluster the samples showing malign behavior. Another clustering approach proposed by Jacob et al [9] which specifically identifies botinitiated Command & Control (C&C) communication.…”
Section: Graph-based Approachesmentioning
confidence: 99%
“…Recovering crypto code from traces is an example of the case mentioned above, i.e., of recovering a priori known constructs from code. Finally, VERA is an interesting piece of work on trace visualization [QL09,QLN09]. The goal of VERA is to visualize malware behavior, allowing the reverse engineer to identify malware features without resorting to code analysis.…”
Section: Advancing Trace Analysismentioning
confidence: 99%