2017
DOI: 10.1007/978-3-319-60080-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Assisting Malware Analysis with Symbolic Execution: A Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 19 publications
0
23
0
Order By: Relevance
“…To do this, we train M = 25 separate HMMs, where each HMM is trained on all samples for a particular API function. 13 For an arbitrary mth HMM model, we vectorize using the 12 Figure 3 also suggests that when the predictive model is wrong, the model tends to confuse the true API call with only a very small number of other calls. Indeed, a follow up analysis revealed that the generic API call deobfuscator included the correct API call in its top prediction 75.50% of the time, top 2 predictions 89.26% of the time, and top 3 predictions 92.38% of the time.…”
Section: A Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…To do this, we train M = 25 separate HMMs, where each HMM is trained on all samples for a particular API function. 13 For an arbitrary mth HMM model, we vectorize using the 12 Figure 3 also suggests that when the predictive model is wrong, the model tends to confuse the true API call with only a very small number of other calls. Indeed, a follow up analysis revealed that the generic API call deobfuscator included the correct API call in its top prediction 75.50% of the time, top 2 predictions 89.26% of the time, and top 3 predictions 92.38% of the time.…”
Section: A Methodologymentioning
confidence: 99%
“…Indeed, a follow up analysis revealed that the generic API call deobfuscator included the correct API call in its top prediction 75.50% of the time, top 2 predictions 89.26% of the time, and top 3 predictions 92.38% of the time. 13 Note that we are now treating each API call sample as an i.i.d sample from the population of some particular API function, rather than from a population of all API function, as in Experiment 1. number of arguments m appropriate for the corresponding API name. 14 In this way, we obtain M * (K + 3) = 325 features for each sample.…”
Section: A Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…The ability of ANGR to reason on binary code lifted to platform-agnostic VEX IR makes it an extremely powerful, versatile tool for security researchers that exploit symbolic execution with the ultimate goal of, for example, finding vulnerabilities [5], bypassing authentication checks in 20 of 35 L. Borzacchiello ET AL. device firmware [26] or dissecting malware [27]. Although ANGR integrates several state-of-the-art program analysis techniques such as veritesting [4] to improve scalability, it still struggles when analysing real-world programs.…”
Section: Application Domainsmentioning
confidence: 99%
“…Previous research has explored static analysis techniques to ease RAT dissection: in particular, [2] proposes symbolic execution to reveal and analyze the commands supported by a RAT without requiring the presence of the server counterpart. The output is a collection of execution traces enriched with symbolic constraints on the data buffers exchanged throughout communications.…”
Section: Introductionmentioning
confidence: 99%