skip to main content
10.1145/3243734.3243771acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost

Published: 15 October 2018 Publication History

Abstract

Binary packing, encoding binary code prior to execution and decoding them at run time, is the most common obfuscation adopted by malware authors to camouflage malicious code. Especially, most packers recover the original code by going through a set of "written-then-executed" layers, which renders determining the end of the unpacking increasingly difficult. Many generic binary unpacking approaches have been proposed to extract packed binaries without the prior knowledge of packers. However, the high runtime overhead and lack of anti-analysis resistance have severely limited their adoptions. Over the past two decades, packed malware is always a veritable challenge to anti-malware landscape. This paper revisits the long-standing binary unpacking problem from a new angle: packers consistently obfuscate the standard use of API calls. Our in-depth study on an enormous variety of Windows malware packers at present leads to a common property: malware's Import Address Table (IAT), which acts as a lookup table for dynamically linked API calls, is typically erased by packers for further obfuscation; and then unpacking routine, like a custom dynamic loader, will reconstruct IAT before original code resumes execution. During a packed malware execution, if an API is invoked through looking up a rebuilt IAT, it indicates that the original payload has been restored. This insight motivates us to design an efficient unpacking approach, called BinUnpack. Compared to the previous methods that suffer from multiple "written-then-executed" unpacking layers, BinUnpack is free from tedious memory access monitoring, and therefore it introduces very small runtime overhead. To defeat a variety of ever-evolving evasion tricks, we design BinUnpack's API monitor module via a novel kernel-level DLL hijacking technique. We have evaluated BinUnpack's efficacy extensively with more than 238K packed malware and multiple Windows utilities. BinUnpack's success rate is significantly better than that of existing tools with several orders of magnitude performance boost. Our study demonstrates that BinUnpack can be applied to speeding up large-scale malware analysis.

Supplementary Material

MP4 File (p395-cheng.mp4)

References

[1]
Aguila. 2016. Scylla - x64/x86 Imports Reconstruction. https://github.com/ NtQuery/Scylla. (2016).
[2]
Anonymous Author. 2004. Hooking Windows API - Technics of hooking API functions on Windows. The CodeBreakers Journal 1, 2 (2004).
[3]
Piotr Bania. 2009. Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs. https://arxiv.org/abs/0905.4581. (2009).
[4]
Munkhbayar Bat-Erdene, Taebeom Kim, Hyundo Park, and Heejo Lee. 2017. Packer Detection for Multi-Layer Executables Using Entropy Analysis. Entropy 19, 3 (2017).
[5]
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. 2009. Scalable, Behavior-Based Malware Clustering. In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09).
[6]
Henry Belot and Stephanie Borys. 2017. Ransomware attack still looms in Australia as Government warns WannaCry threat not over. http://www.abc.net.au/news/2017-05--15/ransomware-attack-to-hit-victimsin- australia-government-says/8526346. (May 16 2017).
[7]
Leyla Bilge, Andrea Lanzi, and Davide Balzarotti. 2011. Thwarting Real-time Dynamic Unpacking. In Proceedings of the Fourth European Workshop on System Security (EUROSEC'11).
[8]
Lutz Böhne. 2008. Pandora's Bochs: Automatic unpacking of malware. University of Mannheim 6 (2008).
[9]
Guillaume Bonfante, Jose Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, and Aurélien Thierry. 2015. CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS'15).
[10]
Denis Bueno, Kevin J. Compton, Karem A. Sakallah, and Michael Bailey. 2013. Detecting Traditional Packers, Decisively. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'13).
[11]
Alexei Bulazel and Bülent Yener. 2017. A Survey On AutomatedDynamic Malware Analysis Evasion and Counter-Evasion: PC, Mobile, and Web. In Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium.
[12]
Jamie Butler and Kris Kendal. 2007. Blackout: What really happened. Black Hat USA. (2007).
[13]
Joan Calvet and Pierre-Marc Bureau. 2010. Understanding Swizzor's Obfuscation Scheme. REcon 2010. (2010).
[14]
Joan Calvet, Fanny Lalonde Lévesque, Jose M. Fernandez, Erwann Traourouder, Francois Menet, and Jean-Yves Marion. 2015. WaveAtlas: surfing through the landscape of current malware packers. Virus Bulletin Conference. (2015).
[15]
Cisco. 2017. Cisco 2017 Midyear Cybersecurity Report. https://www.cisco.com/ c/m/en_au/products/security/offers/annual-cybersecurity-report-2017.html. (2017).
[16]
Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, and Davide Balzarotti. 2018. Understanding Linux Malware. In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18).
[17]
DataRescue. 2005. Using the Universal PE Unpacker Plug-in included in IDA Pro 4.9 to unpack compressed executables. https://www.hex-rays.com/products/ida/ support/tutorials/unpack_pe/unpacking.pdf. (2005).
[18]
Saumya Debray and Jay Patel. 2010. Reverse Engineering Self-Modifying Code: Unpacker Extraction. In Proceedings of the 17th Working Conference on Reverse Engineering (WCRE'10).
[19]
Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. 2008. Ether: Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08).
[20]
Ken Dunham and Egan Hadsell. 2011. Malcode Context of API Abuse. SANS Institute InfoSec Reading Room. (2011).
[21]
Peter Ferrie. 2008. Anti-unpacker tricks. Virus Bulletin. (2008).
[22]
Stephen Fewer. 2013. Reflective DLL Injection. https://github.com/stephenfewer/ ReflectiveDLLInjection. (2013).
[23]
Halvar Flake. 2004. Structural comparison of executable objects. In Proceedings of the 2004 GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA'04).
[24]
Jianming Fu, Xinwen Liu, and Binling Cheng. 2011. Malware behavior Capturing based on Taint Propagation and Stack Backtracing. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'11).
[25]
Gabriela Limon Garcia. 2007. Forensic physical memory analysis: an overview of tools and techniques. In TKK T-110.5290 Seminar on Network Security. 305--320.
[26]
Joseph Gardiner, Marco Cova, and Shishir Nagaraja. 2014. Command & Control: Understanding, Denying and Detecting. arXiv CoRR abs/1408.1136 (2014). http: //arxiv.org/abs/1408.1136
[27]
Emre Güler. 2017. Anti-Sandboxing Techniques in Cerber Ransomware. VMRay Blog. (2017).
[28]
Fanglu Guo, Peter Ferrie, and Tzi-Cker Chiueh. 2008. A Study of the Packer Problem and Its Solutions. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08).
[29]
Irfan Ul Haq, Sergio Chica, Juan Caballero, and Somesh Jha. 2017. Malware Lineage in the Wild. arXiv:1710.05202 {cs.CR}. (2017).
[30]
Ashkan Hosseini. 2017. Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques. Endpoint Security Blog. (2017).
[31]
Xin Hu, Sandeep Bhatkar, Kent Griffin, and Kang G. Shin. 2013. MutantX-S: Scalable Malware Clustering Based on Static Features. In Proceedings of the 2013 USENIX Conference on Annual Technical Conference (USENIX ATC'13).
[32]
Xin Hu, Tzi cker Chiueh, and Kang G. Shin. 2009. Large-scale malware indexing using function-call graphs. In Proceedings of the 16th ACM conference on Computer and Communications Security (CCS'09).
[33]
Galen Hunt and Doug Brubacher. 1999. Detours: Binary interception of win32 functions. In 3rd Usenix Windows NT Symposium.
[34]
Huorong Network. 2017. The Introduction to Huorong Anti-Virus Engine. http: //www.huorong.cn/doc/introduce_engine.pdf. (2017).
[35]
Ryoichi Isawa, Masakatu Morii, and Daisuke Inoue. 2016. Comparing Malware Samples for Unpacking: A Feasibility Study. In Proceedings of the 11th Asia Joint Conference on Information Security.
[36]
Min Gyung Kang, Pongsin Poosankam, and Heng Yin. 2007. Renovo: A hidden code extractor for packed executables. In Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM'07).
[37]
Yuhei Kawakoya, Makoto Iwamura, and Mitsutaka Itoh. 2010. Memory behaviorbased automatic malware unpacking in stealth debugging environment. In Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE'10).
[38]
Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, and Takeo Hariu. 2013. API Chaser: Anti-analysis Resistant Malware Analyzer. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'13).
[39]
Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, and Takeshi Yada. 2017. Stealth Loader: Trace-Free Program Loading for API Obfuscation. In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'17).
[40]
Hyung Chan Kim, Tatsunori ORII, Katsunari Yoshioka, Daisuke Inoue, Jungsuk Song, Masashi ETO, Junji Shikata, Tsutomu Matsumoto, and Koji Nakao. 2011. An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation. IEICE TRANSACTIONS on Information and Systems E94-D, 9 (2011).
[41]
Paul Kimayong. 2017. New Breed of Cerber Ransomware Employs Anti-Sandbox Armoring. https://www.cyphort.com/new-breed-of-cerberransomware- employs-anti-sandbox-armoring. (2017).
[42]
Dhilung Kirat and Giovanni Vigna. 2015. MalGene: Automatic Extraction of Malware Analysis Evasion Signature. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS'15).
[43]
Eugene Kolodenker, William Koch, Gianluca Stringhini, and Manuel Egele. 2017. PayBreak: Defense Against Cryptographic Ransomware. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS'17).
[44]
David Korczynski. 2016. RePEconstruct: reconstructing binaries with selfmodifying code and import address table destruction. In Proceedings of the 11th International Conference on Malicious and Unwanted Software (MALWARE'16).
[45]
C. Kruegel, W. Robertson, F. Valeur, and G. Vigna. 2004. Static Disassembly of Obfuscated Binaries. In Proceedings of the 13th USENIX Security Symposium (USENIX Security'04).
[46]
Taeho Kwon and Zhendong Su. 2010. Automatic Detection of Unsafe Component Loadings. In Proceedings of the 19th International Symposium on Software Testing and Analysis (ISSTA'10).
[47]
Taeho Kwon and Zhendong Su. 2012. Automatic detection of unsafe dynamic component loadings. IEEE Transactions on Software Engineering 38, 2 (2012), 293--313.
[48]
John Leitch. 2011. Process Hollowing. https://www.autosectools.com/Process- Hollowing.pdf. (2011).
[49]
Julien Lenoir. 2015. Implementing your own generic unpacker. HITB Singapore 2015. (2015).
[50]
Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, and Stefano Zanero. 2012. Lines of Malicious Code: Insights into the Malicious Software Industry. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12).
[51]
Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, and Chunfu Jia. 2009. Denial-of- Service Attacks on Host-Based Generic Unpackers. In Proceedings of the 11th International Conference on Information and Communications Security (ICICS'09).
[52]
Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation(PLDI'05).
[53]
Gustav Lundsgård and Victor Nedström. 2016. Bypassing modern sandbox technologies. Master's thesis. Lund University.
[54]
Robert Lyda and James Hamrock. 2007. Using Entropy Analysis to Find Encrypted and Packed Malware. IEEE Security and Privacy 5, 2 (2007).
[55]
Sebastiano Mariani, Lorenzo Fontana, Fabio Gritti, and Stefano D'Alessio. 2016. PinDemonium: a DBI-based generic unpacker for Windows executables. Black Hat USA. (2016).
[56]
Lorenzo Martignoni, Mihai Christodorescu, and Somesh Jha. 2007. OmniUnpack: Fast, generic, and safe unpacking of malware. In Proceedings of the 23nd Annual Computer Security Applications Conference (ACSAC'07).
[57]
Aldo Mazzeo. 2016. Custom LoadLibrary implementation. https://github.com/ gbmaster/loadLibrary. (2016).
[58]
Microsoft. last reviewed, 05/08/2018. Linking Explicit. https://msdn.microsoft. com/en-us/library/784bt7z7.aspx. (last reviewed, 05/08/2018).
[59]
Microsoft. last reviewed, 05/08/2018. Linking Implicitly. https://msdn.microsoft. com/en-us/library/d14wsce5.aspx/. (last reviewed, 05/08/2018).
[60]
Matt Miller. 2008. Using dual-mappings to evade automated unpackers. http: //www.uninformed.org/?v=10&a=1. (2008).
[61]
Byungho Min and Vijay Varadharajan. 2015. Secure Dynamic Software Loading and Execution Using Cross Component Verification. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'15).
[62]
Byungho Min and Vijay Varadharajan. 2016. Rethinking Software Component Security: Software Component Level Integrity and Cross Verification. Comput. J. 59, 11 (2016), 1735--1748.
[63]
Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. BinSim: Tracebased Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security'17).
[64]
M. Morgenstern and A. Marx. 2008. Runtime Packer Testing Experiences. 2nd International CARO Workshop. (2008).
[65]
Maik Morgenstern and Hendrik Pilz. 2010. Useful and useless statistics about viruses and anti-virus programs. 4th International CARO Workshop. (2010).
[66]
Ellen Nakashima and Philip Rucker. 2017. U.S. declares North Korea carried out massive WannaCry cyberattack. The Washington Post. (December 19 2017).
[67]
Lakshman Nataraj. 2013. Nearly 70% of Packed Windows System files are labeled as Malware. UCSB Sarvam Blog. (2013).
[68]
NO-MERCY. 2015. Top Maliciously Used APIs. https://rstforums.com/forum/ topic/95273-top-maliciously-used-apis/. (2015).
[69]
Jon Oberheide, Michael Bailey, and Farnam Jahanian. 2009. PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion. In Proceedings of the 3rd USENIX Conference on Offensive Technologies (WOOT'09).
[70]
Philip OKane, Sakir Sezer, and Kieran McLaughlin. 2011. Obfuscation: The Hidden Malware. IEEE Security and Privacy 9, 5 (2011).
[71]
Digit Oktavianto and Iqbal Muhardianto. 2013. Cuckoo Malware Analysis: Analyze malware using Cuckoo Sandbox. Packt Publishing Ltd.
[72]
Oreans Technologies. last reviewed, 05/08/2018. Themida: Advanced Windows Software Protection System. https://www.oreans.com/themida.php. (last reviewed, 05/08/2018).
[73]
Panda Security. 2017. PandaLabs Annual Report 2017. https://www.pandasecurity. com/mediacenter/src/uploads/2017/11/PandaLabs_Annual_Report_2017.pdf. (2017).
[74]
Roberto Perdisci, Andrea Lanzi, and Wenke Lee. 2008. Classification of Packed Executables for Accurate Computer Virus Detection. Pattern Recognition Letters 29, 14 (Oct. 2008).
[75]
I Phillips. 2006. Windows Vista security: first impressions. information security technical report 11, 4 (2006), 176--185.
[76]
Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontata, Fabio Gritti, and Stefano Zanero. 2017. Measuring and Defeating Anti- Instrumentation-Equipped Malware. In Proceedings of the 14th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'17).
[77]
Danny Quist and Valsmith. 2007. Covert Debuging: Circumventing Software Armoring Techniques. Black Hat USA. (2007).
[78]
Jason Raber and Brian Krumheuer. 2009. QuietRIATT: Rebuilding the Import Address Table Using Hooked DLL Calls. Black Hat DC. (2009).
[79]
Max Rival. last reviewed, 05/08/2018. Dynamic-Link Library Hijacking. https: //www.exploit-db.com/docs/31687.pdf. (last reviewed, 05/08/2018).
[80]
J Robbins. 1999. Debugging Windows based applications using WinDbg. Miscrosoft Systems Journal (1999).
[81]
Kevin A. Roundy and Barton P. Miller. 2010. Hybrid Analysis and Control of Malware. In Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection (RAID'10).
[82]
Kevin A. Roundy and Barton P. Miller. 2013. Binary-code Obfuscations in Prevalent Packer Tools. Comput. Surveys 46, 1 (2013).
[83]
Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, and Wenke Lee. 2006. PolyUnpack: Automating the hidden-code extraction of unpack-executing malware. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06).
[84]
Mark E Russinovich, David A Solomon, and Alex Ionescu. 2012. Windows Internals (6th Edition). Microsoft Press.
[85]
Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. 2009. Automatic reverse engineering of malware emulators. In Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P'09).
[86]
Monirul Sharif, Vinod Yegneswaran, Hassen Saidi, Phillip Porras, andWenke Lee. 2008. Eureka: A framework for enabling static malware analysis. In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS'08).
[87]
Paria Shirani, Lingyu Wang, and Mourad Debbabi. 2017. BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. In Proceedings of the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'17).
[88]
Michael Sikorski and Andrew Honig. 2012. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press.
[89]
Alexey Sintsov. 2010. Writing JIT-spray shellcode for fun and profit. Digital Security Research Group (DSecRG). (2010).
[90]
Sherri Sparks and Jamie Butler. 2005. Shadow Walker: Raising The Bar For Windows Rootkit Detection. Black Hat Japan. (2005).
[91]
Joe Stewart. 2007. Unpacking with OllyBonE. http://www.joestewart.org/ ollybone/. (2007).
[92]
Hung Min Sun, Yue Hsun Lin, and Ming Fung Wu. 2006. API Monitoring System for Defeating Worms and Exploits in MS-Windows System. In Proceedings of the 11th Australasian Conference on Information Security and Privacy (ACISP'06).
[93]
Gabor Szappanos. 2007. Exepacker blacklisting. Virus Bulletin. (2007).
[94]
Brad Taylor. 2017. Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies. https://www.helpnetsecurity.com/2017/11/09/ extortion-based-cyber-attacks/. (2017).
[95]
Check Point Research Team. 2017. May's Most Wanted Malware: Fireball and Wannacry Impact More Than 1 in 4 Organizations Globally. https://blog.checkpoint.com/2017/06/20/mays-wanted-malware-fireballwannacry- impact-1--4-organizations-globally. (2017).
[96]
Check Point Research Team. 2018. March's Most Wanted Malware: Cryptomining Malware That Works Even Outside the Web Browser on the Rise. https://blog.checkpoint.com/2018/04/13/marchs-wanted-malwarecryptomining- malware-works-even-outside-web-browser-rise. (2018).
[97]
Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, and Pablo G Bringas. 2015. SoK: Deep packer inspection: A longitudinal study of the complexity of runtime packers. In Proceedings of the 36th IEEE Symposium on Security & Privacy (S&P'15).
[98]
Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, and Pablo G. Bringas. 2016. RAMBO: Run-time packer Analysis with Multiple Branch Observation. In Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'16).
[99]
Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Carlos Laorden, and Pablo Garcia Bringas. 2012. Countering entropy measure attacks on packed software detection. In Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC'12).
[100]
Giovanni Vigna and Davide Balzarotti. 2018. When Malware is Packing Heat. In USENIX Enigma 2018.
[101]
Carsten Willems, Thorsten Holz, and Felix Freiling. 2007. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy 5, 2 (2007).
[102]
Babak Yadegari, Brian Johannesmeyer, Ben Whitely, and Saumya Debray. 2015. A generic approach to automatic deobfuscation of executable code. In Proceedings of the 36th IEEE Symposium on Security & Privacy (S&P'15).
[103]
Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, and Heng Yin. 2012. V2E: Combining Hardware Virtualization and Softwareemulation for Transparent and Extensible Malware Analysis. In Proceedings of the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'12).
[104]
Wei Yan, Zheng Zhang, and Nirwan Ansari. 2008. Revealing Packed Malware. IEEE Security and Privacy 6, 5 (Sept. 2008).
[105]
Udi Yavo and Tomer Bitton. 2016. Captain Hook: Pirating AVS to Bypass Exploit Mitigations. Black Hat USA. (2016).
[106]
Lenny Zeltser. 2017. The History of Fileless Malware -- Looking Beyond the Buzzword. https://zeltser.com/fileless-malware-beyond-buzzword/. (2017).

Cited By

View all
  • (2024)Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE MalwareElectronics10.3390/electronics1311208113:11(2081)Online publication date: 27-May-2024
  • (2024)TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness AnalysisProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653278(349-360)Online publication date: 19-Jun-2024
  • (2024)Reducing Malware Analysis Overhead With CoveringsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334632821:4(4133-4146)Online publication date: Jul-2024
  • Show More Cited By

Index Terms

  1. Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
    October 2018
    2359 pages
    ISBN:9781450356930
    DOI:10.1145/3243734
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. generic binary unpacking
    2. import address table
    3. kernel-level dll hijacking
    4. windows malware analysis

    Qualifiers

    • Research-article

    Funding Sources

    • Sichuan Province Research and Technology Supporting Plan
    • The University of Texas System STARs Program
    • The National Natural Science Foundation of China
    • The National Key R&D Program of China
    • The Natural Science Foundation of Hubei Province of China

    Conference

    CCS '18
    Sponsor:

    Acceptance Rates

    CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)167
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 23 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE MalwareElectronics10.3390/electronics1311208113:11(2081)Online publication date: 27-May-2024
    • (2024)TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness AnalysisProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653278(349-360)Online publication date: 19-Jun-2024
    • (2024)Reducing Malware Analysis Overhead With CoveringsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334632821:4(4133-4146)Online publication date: Jul-2024
    • (2024)Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detectionComputers & Security10.1016/j.cose.2024.104115(104115)Online publication date: Sep-2024
    • (2024)Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense MethodDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_8(150-173)Online publication date: 9-Jul-2024
    • (2023)On the feasibility of malware unpacking via hardware-assisted loop profilingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620656(7481-7498)Online publication date: 9-Aug-2023
    • (2023)Bypassing Heaven’s Gate Technique Using Black-Box TestingSensors10.3390/s2323941723:23(9417)Online publication date: 26-Nov-2023
    • (2023)APIASO: A Novel API Call Obfuscation Technique Based on Address Space ObscurityApplied Sciences10.3390/app1316905613:16(9056)Online publication date: 8-Aug-2023
    • (2023)Xunpack: Cross-Architecture Unpacking for Linux IoT MalwareProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607214(471-484)Online publication date: 16-Oct-2023
    • (2023)PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer DetectionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616625(3078-3092)Online publication date: 15-Nov-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media