Linear Obfuscation to Combat Symbolic Execution
Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. We propose a novel automatic malware obfuscation...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2005 https://ink.library.smu.edu.sg/context/sis_research/article/3004/viewcontent/esorics11.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-3004 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-30042014-02-04T11:54:04Z Linear Obfuscation to Combat Symbolic Execution WANG, Zhi Ming, Jiang Jia, Chunfu GAO, Debin Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. We propose a novel automatic malware obfuscation technique to make analysis based on symbolic execution difficult. Unlike previously proposed techniques, the obfuscated code from our tool does not use any cryptographic operations and makes use of only linear operations which symbolic execution is believed to be good in analyzing. The obfuscated code incorporates unsolved conjectures and adds a simple loop to the original code, making it less than one hundred bytes longer and hard to be differentiated from normal programs. Evaluation shows that applying symbolic execution to the obfuscated code is inefficient in finding the trigger condition. We discuss strengths and weaknesses of the proposed technique. 2011-09-12T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2005 info:doi/10.1007/978-3-642-23822-2_12 https://ink.library.smu.edu.sg/context/sis_research/article/3004/viewcontent/esorics11.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Software obfuscation symbolic execution malware analysis Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Software obfuscation symbolic execution malware analysis Information Security |
spellingShingle |
Software obfuscation symbolic execution malware analysis Information Security WANG, Zhi Ming, Jiang Jia, Chunfu GAO, Debin Linear Obfuscation to Combat Symbolic Execution |
description |
Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. We propose a novel automatic malware obfuscation technique to make analysis based on symbolic execution difficult. Unlike previously proposed techniques, the obfuscated code from our tool does not use any cryptographic operations and makes use of only linear operations which symbolic execution is believed to be good in analyzing. The obfuscated code incorporates unsolved conjectures and adds a simple loop to the original code, making it less than one hundred bytes longer and hard to be differentiated from normal programs. Evaluation shows that applying symbolic execution to the obfuscated code is inefficient in finding the trigger condition. We discuss strengths and weaknesses of the proposed technique. |
format |
text |
author |
WANG, Zhi Ming, Jiang Jia, Chunfu GAO, Debin |
author_facet |
WANG, Zhi Ming, Jiang Jia, Chunfu GAO, Debin |
author_sort |
WANG, Zhi |
title |
Linear Obfuscation to Combat Symbolic Execution |
title_short |
Linear Obfuscation to Combat Symbolic Execution |
title_full |
Linear Obfuscation to Combat Symbolic Execution |
title_fullStr |
Linear Obfuscation to Combat Symbolic Execution |
title_full_unstemmed |
Linear Obfuscation to Combat Symbolic Execution |
title_sort |
linear obfuscation to combat symbolic execution |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/2005 https://ink.library.smu.edu.sg/context/sis_research/article/3004/viewcontent/esorics11.pdf |
_version_ |
1770571765184987136 |