Title: | reconbin: reconstructing binary file from execution for software analysis |
Author: | Ying Lingyun
; Su Purui
; Feng Dengguo
; Wang Xianggen
; Yang Yi
; Liu Yu
|
Source: | SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement
|
Conference Name: | 3rd International Conference on Secure Software Integration and Reliability Improvement
|
Conference Date: | JUL 08-10,
|
Issued Date: | 2009
|
Conference Place: | Shanghai, PEOPLES R CHINA
|
Keyword: | execution monitoring
; software security
; analysis
; malware analysis
; binary analysis
|
Publisher: | 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS
|
Publish Place: | 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
|
ISBN: | 978-0-7695-3758-0
|
Department: | Ying, Lingyun; Su, Purui; Feng, Dengguo Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China.
|
Sponsorship: | IEEE Reliabil Soc, Shanghai Jiao Tong Univ
|
English Abstract: | Static analysis is one of the most popular approaches of software analysis. As more and more software protects their code by transformation or encryption, then releases them at runtime dynamically, it is hard to statically analyze these protected executables because of the failure of disassembling. In this paper, we propose a novel and general technique to reconstruct binary files for static analysis by monitoring the executions of protected executables. Our approach can identify and extract the dynamically released code at runtime, and at the same time record the control transfers information, and then reconstruct a binary file based on the original executable. The whole process does not depend on any prior knowledge on the protection methods. Experiments on our prototype ReconBin show that our approach can properly reconstruct the executables protected by SMC and packers, and the reconstructed binary files can be successfully analyzed by static analysis tools such as IDA Pro. We show that it also can be used to analyze the code dynamically generated by virtual machines, emulators, and buffer overflow attacks, which also dynamically inject attack code into stack and direct execution flow to it. |
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/8270
|
Appears in Collections: | 信息安全国家重点实验室_会议论文
|
There are no files associated with this item.
|
Recommended Citation: |
Ying Lingyun,Su Purui,Feng Dengguo,et al. reconbin: reconstructing binary file from execution for software analysis[C]. 见:3rd International Conference on Secure Software Integration and Reliability Improvement. Shanghai, PEOPLES R CHINA. JUL 08-10,.
|
|
|