2018
DOI: 10.1007/978-3-319-89500-0_28
|View full text |Cite
|
Sign up to set email alerts
|

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Symbolic executors usually know common arithmetic identities and can perform basic simplification, e. g., constant propagation. Applied to code obfuscation, symbolic execution is used to symbolically extract the core semantics of VM handlers [42], track user input in an execution trace [54,71,72], or detect opaque predicates (in combination with SMT solvers) [5]. Typically, techniques to impede symbolic execution aim at artificially increasing the syntactic complexity of arithmetic operations (via MBAs) or the number of paths to analyze (triggering a so-called path explosion) [1,49].…”
Section: Automated Deobfuscation Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Symbolic executors usually know common arithmetic identities and can perform basic simplification, e. g., constant propagation. Applied to code obfuscation, symbolic execution is used to symbolically extract the core semantics of VM handlers [42], track user input in an execution trace [54,71,72], or detect opaque predicates (in combination with SMT solvers) [5]. Typically, techniques to impede symbolic execution aim at artificially increasing the syntactic complexity of arithmetic operations (via MBAs) or the number of paths to analyze (triggering a so-called path explosion) [1,49].…”
Section: Automated Deobfuscation Attacksmentioning
confidence: 99%
“…Table 1). Subsequently, the resulting code can be further simplified using a wide range of automated techniques, including taint analysis [70,72], symbolic execution [71,72], program synthesis [7,22], and various other techniques [5,6,18,26,27,31,33,38,42,53,54,58].…”
Section: Introductionmentioning
confidence: 99%
“…[18] has been tested with VMProtect for the evaluation of the implementation results. [9] proposed a method to analyze the virtualization structure by applying symbolic execution and compiler optimization together. In [9], the extracted symbol and virtual code were converted to C language to remain semantically equivalent to the original program.…”
Section: A Analysis Of Virtualization Obfuscationmentioning
confidence: 99%
“…[9] proposed a method to analyze the virtualization structure by applying symbolic execution and compiler optimization together. In [9], the extracted symbol and virtual code were converted to C language to remain semantically equivalent to the original program. In this study, PinTool was used as a tool to accurately extract the dispatcher of virtualization structure.…”
Section: A Analysis Of Virtualization Obfuscationmentioning
confidence: 99%