z-logo
open-access-imgOpen Access
CoDisasm
Author(s) -
Guillaume Bonfante,
José M. Fernandez,
Jean-Yves Marion,
Benjamin Rouxel,
Fabrice Sabatier,
Aurélien Thierry
Publication year - 2015
Publication title -
hal (le centre pour la communication scientifique directe)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/2810103.2813627
Subject(s) - computer science , obfuscation , malware , reverse engineering , static analysis , x86 , context (archaeology) , focus (optics) , malware analysis , code (set theory) , symbolic execution , machine code , task (project management) , representation (politics) , binary code , finite state machine , state (computer science) , binary number , programming language , software , computer security , compiler , set (abstract data type) , engineering , mathematics , systems engineering , law , arithmetic , optics , biology , paleontology , political science , physics , politics
International audienceFighting malware involves analyzing large numbers of suspicious binary files. In this context, disassembly is a crucial task in malware analysis and reverse engineering. It involves the recovery of assembly instructions from binary machine code. Correct disassembly of binaries is necessary to produce a higher level representation of the code and thus allow the analysis to develop high-level understanding of its behavior and purpose. Nonetheless, it can be problematic in the case of malicious code, as malware writers often employ techniques to thwart correct disassembly by standard tools. In this paper, we focus on the disassembly of x86 self-modifying binaries with overlapping instructions. Current state-of-the-art disassemblers fail to interpret these two common forms of obfuscation, causing an incorrect disassembly of large parts of the input. We introduce a novel disas-sembly method, called concatic disassembly, that combines CONCrete path execution with stATIC disassembly. We have developed a standalone disassembler called CoDisasm that implements this approach. Our approach substantially improves the success of disassembly when confronted with both self-modification and code overlap in analyzed bina-ries. To our knowledge, no other disassembler thwarts both of these obfuscations methods together

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom