2009
DOI: 10.1007/s11416-009-0126-4
|View full text |Cite
|
Sign up to set email alerts
|

Automatic binary deobfuscation

Abstract: This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscation. Our current approach is based on a local semantic analysis, which aims to rewrite the binary code in a simpler (easier to understand) way. This approach has the advantage of not relying on a manual search for "patterns" of obfuscation. This way of manipulating the code is, at the end, quite similar to the optimising stage of most of compil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Obfuscated program is constructed by instruction fragment diversification and control flow randomization, as shown in Fig. 3, where instruction fragments (31,32,33,34) and (41, 42, 43, 44) are generated from the instruction fragments 3 and 4 with diversified transformation rules. The original basic block only has one execute path, such as 1->2->3->4.…”
Section: E a Case In Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Obfuscated program is constructed by instruction fragment diversification and control flow randomization, as shown in Fig. 3, where instruction fragments (31,32,33,34) and (41, 42, 43, 44) are generated from the instruction fragments 3 and 4 with diversified transformation rules. The original basic block only has one execute path, such as 1->2->3->4.…”
Section: E a Case In Studymentioning
confidence: 99%
“…The existing deobfuscation algorithms are based on the optimization theory [33], including peephole optimization, constant propagation, constant folding, operand folding, and stack optimization. These methods can remove junk instructions and invalid branches in functions that deobfuscate redundant codes to a certain extent.…”
Section: Deobfuscation Measurementmentioning
confidence: 99%
“…We then transform the output of IDA into the intermediate representation (IR) that is part of METASM [9]. We chose METASM because it can symbolically accumulate assembly instructions in a compact and reasonably accurate form.…”
Section: Semantic Extractionmentioning
confidence: 99%
“…In the best case, they can be reduced to their original appearances. Many researches [10][11][12][13] can help to accomplish this work.…”
Section: A General Design Ideasmentioning
confidence: 99%