2018
DOI: 10.1002/spe.2622
|View full text |Cite
|
Sign up to set email alerts
|

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Abstract: The main goal of code obfuscation is to make software more difficult to reverse engineer. These techniques modify data structures and control flow while retaining the functionality of the original program. Although obfuscation is a useful method for protecting programs, it can also be used to protect malware. This raises concerns that malware could use code obfuscation to avoid detection by antivirus software. It is very difficult to analyze the functionality of obfuscated malware before it has been deobfuscat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…In this paper, since only anti-VM and anti-DBI techniques were analyzed, it is difficult to present experimental results on whether the proposed bypass algorithm works properly even when other obfuscation options are applied. However, in the case of Themida, it is a structure in which unpacking is executed if it is not detected after the anti-analysis technique is performed, and these two parts can be considered to be separate [19]. Even when other protection techniques are applied, anti-analysis techniques are performed first and followed by other techniques.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…In this paper, since only anti-VM and anti-DBI techniques were analyzed, it is difficult to present experimental results on whether the proposed bypass algorithm works properly even when other obfuscation options are applied. However, in the case of Themida, it is a structure in which unpacking is executed if it is not detected after the anti-analysis technique is performed, and these two parts can be considered to be separate [19]. Even when other protection techniques are applied, anti-analysis techniques are performed first and followed by other techniques.…”
Section: Discussionmentioning
confidence: 99%
“…Even when other protection techniques are applied, anti-analysis techniques are performed first and followed by other techniques. Therefore, even if other options are applied, deobfuscation should be applied after bypassing the anti-analysis technique, according to Suk et al [19]. Since other commercial protectors have a similar structure, the bypass algorithm presented in this paper can work normally even when other obfuscation options are applied.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To the best of our knowledge, it cannot unpack recent version of sophisticated (commercial) packers, including VMProtect, Themida, and Safengine. Recently, UnThemida [36] was developed as a plug-in for the Pin tool to analyze and to unpack the structure of files packed with Themida 2.4.5. Unlike previous tools including UnThemida or UPX unpacker, x64Unpack is designed to cope with diverse packers: it can handle both finding general unpacking routines and evading various anti-reverse engineering techniques.…”
Section: Related Workmentioning
confidence: 99%