2020
DOI: 10.1109/access.2020.3008900
|View full text |Cite
|
Sign up to set email alerts
|

x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4

Abstract: In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. To protect malware, they use packers, which are (commercial) tools that contain various anti-reverse engineering techniques such as code encryption, anti-debugging, and code virtualization. In this paper, we present x64Unpack: a hybrid emulation scheme that makes it easier to analyze packed executable files and automatically unpacks them in 64-bit Wind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(19 citation statements)
references
References 20 publications
0
19
0
Order By: Relevance
“…These techniques include anti-debugging, anti-virtual machine, and anti-emulation strategies that complicate the analysis process. Previous studies have successfully bypassed such techniques in commercial protectors and unpacked malware protected by known packers [5,7,16,17]. However, challenges persist with unknown packers, and research is ongoing to overcome these obstacles from yet unidentified packers.…”
Section: Anti-analysis Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…These techniques include anti-debugging, anti-virtual machine, and anti-emulation strategies that complicate the analysis process. Previous studies have successfully bypassed such techniques in commercial protectors and unpacked malware protected by known packers [5,7,16,17]. However, challenges persist with unknown packers, and research is ongoing to overcome these obstacles from yet unidentified packers.…”
Section: Anti-analysis Techniquesmentioning
confidence: 99%
“…These tools go beyond simple compression; they integrate sophisticated anti-analysis and obfuscation techniques into binaries. Packed malware, with its original code encrypted, presents significant detection and analysis challenges, especially in debugger or sandbox environments [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…PEB, one of the basic data structures used in Windows OS, loads process information, and PEB information exists in all processes running in the OS [25]. PEB is defined as a single structure and is a data structure containing process load information [26].…”
Section: Observing Peb Data Of Processmentioning
confidence: 99%
“…Choi, Seokwoo, et al [9] proposed x64Unpack, which analyzes the packed executable file and unpacks it. In addition, the study presents analysis results on how the program packed with VMProtect 3.4 works using x64Unpack and which API is used.…”
Section: Related Workmentioning
confidence: 99%