Logotipo do repositório
 

Publicação:
Context-sensitive analysis of obfuscated x86 executables

dc.contributor.authorLakhotia, Arun
dc.contributor.authorBoccardo, Davidson R. [UNESP]
dc.contributor.authorSingh, Anshuman
dc.contributor.authorManacero Jr., Aleardo [UNESP]
dc.contributor.institutionUniversity of Louisiana
dc.contributor.institutionUniversidade Estadual Paulista (Unesp)
dc.date.accessioned2014-05-27T11:24:40Z
dc.date.available2014-05-27T11:24:40Z
dc.date.issued2010-04-20
dc.description.abstractA method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ret instructions to achieve equivalent behavior. Since definition of context-sensitivity and algorithms for context-sensitive analysis have thus far been based on the specific semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in 'calling'-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control flow graph (ICFG), the same is not true of changes in 'stack'-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the context-sensitive version of the algorithm generates more precise results and is also computationally more efficient than its context-insensitive counterpart. Copyright © 2010 ACM.en
dc.description.affiliationCenter for Advanced Computer Studies University of Louisiana, Lafayette, LA
dc.description.affiliationElectrical Engineering Dept. Paulista State University (UNESP)
dc.description.affiliationUnespElectrical Engineering Dept. Paulista State University (UNESP)
dc.format.extent131-140
dc.identifierhttp://dx.doi.org/10.1145/1706356.1706381
dc.identifier.citationProceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, p. 131-140.
dc.identifier.doi10.1145/1706356.1706381
dc.identifier.scopus2-s2.0-77950882873
dc.identifier.urihttp://hdl.handle.net/11449/71657
dc.language.isoeng
dc.relation.ispartofProceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation
dc.rights.accessRightsAcesso aberto
dc.sourceScopus
dc.subjectAnalysis of bianries
dc.subjectContext-sensitive analysis
dc.subjectDeobfuscation
dc.subjectObfuscation
dc.subjectAbstract interpretations
dc.subjectContext sensitivity
dc.subjectContext-sensitive
dc.subjectControl flow graphs
dc.subjectExecutables
dc.subjectInter-procedural
dc.subjectInter-procedural analysis
dc.subjectProcedure call
dc.subjectSpecific semantics
dc.subjectMathematical operators
dc.subjectProgram interpreters
dc.subjectTechnical presentations
dc.subjectJava programming language
dc.titleContext-sensitive analysis of obfuscated x86 executablesen
dc.typeTrabalho apresentado em evento
dcterms.licensehttp://www.acm.org/publications/copyright-statement
dspace.entity.typePublication

Arquivos

Coleções