2018
DOI: 10.2197/ipsjjip.26.813
|View full text |Cite
|
Sign up to set email alerts
|

Taint-assisted IAT Reconstruction against Position Obfuscation

Abstract: Windows Application Programming Interface (API) is an important data source for analysts to effectively understand the functions of malware. Due to this, malware authors are likely to hide the imported APIs in their malware by taking advantage of various obfuscation techniques. In this paper, we first build a formal model of the Import Address Table (IAT) reconstruction procedure to keep our description independent of specific implementations and then formally point out that the current IAT reconstruction is v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…ere are many works in automatic unpacking of malware and we have already discussed several of these throughout the paper [10,17,21,23,33,39,42]. Some of this work considers the concept of IAT destruction [21,28,39] and IAT reconstruction has also been considered on a more general basis [24]. e work by Ugarte et al [42] highlights several missing gaps in existing unpackers and proposes a system-wide approach to unpacking.…”
Section: Related Workmentioning
confidence: 99%
“…ere are many works in automatic unpacking of malware and we have already discussed several of these throughout the paper [10,17,21,23,33,39,42]. Some of this work considers the concept of IAT destruction [21,28,39] and IAT reconstruction has also been considered on a more general basis [24]. e work by Ugarte et al [42] highlights several missing gaps in existing unpackers and proposes a system-wide approach to unpacking.…”
Section: Related Workmentioning
confidence: 99%