24th International Symposium on Research in Attacks, Intrusions and Defenses 2021
DOI: 10.1145/3471621.3471848
|View full text |Cite
|
Sign up to set email alerts
|

Lost in the Loader:The Many Faces of the Windows PE File Format

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Figure 2 shows that we can achieve a certified accuracy in excess of 90% at a Levenshtein distance radius of 128 bytes when đť‘ť del = 99.5%. This radius is larger than the median Levenshtein distance of two attacks that manipulate headers of PE files [20,57] (see Table 4). We can therefore provide reasonable robustness guarantees against these two attacks.…”
Section: Levenshtein Distance Threat Model We First Present Resultsmentioning
confidence: 87%
See 3 more Smart Citations
“…Figure 2 shows that we can achieve a certified accuracy in excess of 90% at a Levenshtein distance radius of 128 bytes when đť‘ť del = 99.5%. This radius is larger than the median Levenshtein distance of two attacks that manipulate headers of PE files [20,57] (see Table 4). We can therefore provide reasonable robustness guarantees against these two attacks.…”
Section: Levenshtein Distance Threat Model We First Present Resultsmentioning
confidence: 87%
“…The certified radii we observe are close to the best radii theoretically achievable using our mechanism. For the Levenshtein byte-level edit distance threat model, we obtain radii of a few hundred bytes in size, which can certifiably defend against attacks that edit headers of PE files [20,22,57]. However, certifying robustness against more powerful attacks that modify thousands or millions of bytes remains an open challenge.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The PE file structure has 5 main components like DOS header, DOS stub, PE header, section table, and n number of sections. Some of the most common section present are .text, .idata, .edata, rsrc, .rdata and .debug [8][9]. Malware Analysis In reverse engineering, we have certain steps that need to be taken.…”
Section: Pe Structure Analysismentioning
confidence: 99%