2015
DOI: 10.1016/j.tcs.2015.02.024
|View full text |Cite
|
Sign up to set email alerts
|

Unveiling metamorphism by abstract interpretation of code properties

Abstract: interpretation Program semantics Metamorphic malware detection Self-modifying programs Metamorphic code includes self-modifying semantics-preserving transformations to exploit code diversification. The impact of metamorphism is growing in security and code protection technologies, both for preventing malicious host attacks, e.g., in software diversification for IP and integrity protection, and in malicious software attacks, e.g., in metamorphic malware self-modifying their own code in order to foil detection s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…The notion of wave that we use is a little bit different to the one introduced by Dalla Preda, Giacobazzi and Debray [9] (called phase). The main advantage of our approach is that waves can be computed on the fly.…”
Section: Resultsmentioning
confidence: 99%
“…The notion of wave that we use is a little bit different to the one introduced by Dalla Preda, Giacobazzi and Debray [9] (called phase). The main advantage of our approach is that waves can be computed on the fly.…”
Section: Resultsmentioning
confidence: 99%
“…In [12] Dalla Preda et al follow the idea of extracting the specification of the metamorphic engine and of the possible code variants, from the metamorphic code analysis. They introduce a semantics for self-modifying code, called phase semantics, and prove its correctness by proving that it is an abstract interpretation of standard trace semantics.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, they introduce the notion of regular metamorphism, in which the invariants of phase semantics can be modeled as a FSA representing the code structure of all possible metamorphic changes of a metamorphic code. As a matter of fact, the work in [12] can be considered as a general formal framework for modeling malware metamorphism, while our work provides a practical application of the formal framework that allows us to automatically extract the metamorphic signatures as a rewriting rules system.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations