skip to main content
10.1145/3243734.3243827acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification

Published: 15 October 2018 Publication History

Abstract

Code virtualization is a highly sophisticated obfuscation technique adopted by malware authors to stay under the radar. However, the increasing complexity of code virtualization also becomes a "double-edged sword" for practical application. Due to its performance limitations and compatibility problems, code virtualization is seldom used on an entire program. Rather, it is mainly used only to safeguard the key parts of code such as security checks and encryption keys. Many techniques have been proposed to reverse engineer the virtualized code, but they share some common limitations. They assume the scope of virtualized code is known in advance and mainly focus on the classic structure of code emulator. Also, few work verifies the correctness of their deobfuscation results. In this paper, with fewer assumptions on the type and scope of code virtualization, we present a verifiable method to address the challenge of partially-virtualized binary code simplification. Our key insight is that code virtualization is a kind of process-level virtual machine (VM), and the context switch patterns when entering and exiting the VM can be used to detect the VM boundaries. Based on the scope of VM boundary, we simplify the virtualized code. We first ignore all the instructions in a given virtualized snippet that do not affect the final result of that snippet. To better revert the data obfuscation effect that encodes a variable through bitwise operations, we then run a new symbolic execution called multiple granularity symbolic execution to further simplify the trace snippet. The generated concise symbolic formulas facilitate the correctness testing of our simplification results. We have implemented our idea as an open source tool, VMHunt, and evaluated it with real-world applications and malware. The encouraging experimental results demonstrate that VMHunt is a significant improvement over the state of the art.

Supplementary Material

MP4 File (p442-xu.mp4)

References

[1]
Shahid Alam, Issa Traore, and Ibrahim Sogukpinar. 2014. Current Trends and the Future of Metamorphic Malware Detection. In Proceedings of the 7th International Conference on Security of Information and Networks (SIN'14).
[2]
Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley. 2011. AEG: Automatic Exploit Generation on Source Code. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
[3]
Sebastian Banescu, Christian Collberg, Vijay Ganesh, Zack Newsham, and Alexander Pretschner. 2016a. Code Obfuscation Against Symbolic Execution Attacks. In Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC'16).
[4]
Sebastian Banescu, Christian Collberg, and Alexander Pretschner. 2017. Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning. In Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security'17).
[5]
Sebastian Banescu, Ciprian Lucaci, Benjamin Kramer, and Alexander Pretschner. 2016b. VOT4CS: A Virtualization Obfuscation Tool for C#. In Proceedings of the 2016 ACM Workshop on Software PROtection (SPRO'16).
[6]
Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, and David Brumley. 2017. Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. In Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P'17).
[7]
S. Bardin, R. David, and J. Y. Marion. 2017. Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. In Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P'17).
[8]
James R. Bell. 1973. Threaded Code. Commun. ACM, Vol. 16, 6 (1973).
[9]
Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz. 2017. Syntia: Synthesizing the Semantics of Obfuscated Code. In Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security'17).
[10]
Ian Blumenfeld, Roberta Faux, and Paul Li. 2013. SMT Solvers for Malware Unpacking. In Proceedings of the 11th International Workshop on Satisfiability Modulo Theories (SMT'13).
[11]
David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In Proceedings of the 23rd international conference on computer aided verification (CAV'11).
[12]
D. Brumley, P. Poosankam, D. Song, and J. Zheng. 2008. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P'08).
[13]
Joshua Cazalas, J. Todd McDonald, Todd R. Andel, and Natalia Stakhanova. 2014. Probing the Limits of Virtualized Software Protection. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW'14).
[14]
Vitaly Chipounov, Volodymyr Kuznetsov, and George Candea. 2011. S2E: A Platform for In-vivo Multi-path Analysis of Software Systems. In Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'11).
[15]
Christian Collberg. last reviewed, 10/01/2017. The Tigress C Diversifier/Obfuscator. http://tigress.cs.arizona.edu/.
[16]
Christian Collberg and Jasvir Nagra. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection .Addison-Wesley Professional, Chapter 4.4, 258--276.
[17]
C. Collberg, C. Thomborson, and D. Low. 1998. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of programming languages (POPL'98).
[18]
Kevin Coogan and Saumya Debray. 2011. Equational Reasoning on x86 Assembly Code. In Proceedings of the 11th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'11).
[19]
Kevin Coogan, Gen Lu, and Saumya Debray. 2011. Deobfuscation of virtualization-obfuscated software: a semantics-based approach. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11).
[20]
Robin David, Sébastien Bardin, Thanh Dinh Ta, Laurent Mounier, Josselin Feist, Marie-Laure Potet, and Jean-Yves Marion. 2016. BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis. Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER'16) (2016).
[21]
Brian Davis, Andrew Beatty, Kevin Casey, David Gregg, and John Waldron. 2003. The Case for Virtual Register Machines. In Proceedings of the 2003 Workshop on Interpreters, Virtual Machines and Emulators.
[22]
Fabrice Desclaux and Camille Mougey. 2017. Miasm: Reverse Engineering Framework. RECON.
[23]
Anthony Desnos. 2010. Dynamic, Metamorphic (and opensource) Virtual Machines. Hack.lu.
[24]
Robert B. K. Dewar. 1975. Indirect Threaded Code. Commun. ACM, Vol. 18, 6 (1975).
[25]
M. Anton Ertl and David Gregg. 2001. The Behavior of Efficient Virtual Machine Interpreters on Modern Architectures. In Proceedings of the 2001 European Conference on Parallel Processing.
[26]
Nicolas Falliere, Patrick Fitzgerald, and Eric Chien. 2009. Inside the Jaws of Trojan.Clampi. Symantec Technical Report.
[27]
Vijay Ganesh and David L. Dill. 2007. A Decision Procedure for Bit-vectors and Arrays. In Proceedings of the 2007 International Conference in Computer Aided Verification (CAV'07).
[28]
Patrice Godefroid, Michael Y. Levin, and David Molnar. 2008. Automated Whitebox Fuzz Testing. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08).
[29]
Yoann Guillot and Alexandre Gazet. 2010. Automatic binary deobfuscation. Journal in Computer Virology, Vol. 6, 3 (2010).
[30]
Anatoli Kalysch, Johannes Götzfried, and Tilo Müller. 2017. VMAttack: Deobfuscating Virtualization-Based Packed Binaries. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES'17).
[31]
Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, and Takeo Hariu. 2013. API Chaser: Anti-analysis Resistant Malware Analyzer. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'13).
[32]
Johannes Kinder. 2012. Towards Static Analysis of Virtualization-Obfuscated Binaries. In Proceedings of the 19th Working Conference on Reverse Engineering (WCRE'12).
[33]
Samuel T. King, George W. Dunlap, and Peter M. Chen. 2003. Operating System Support for Virtual Machines. In Proceedings of the 2003 USENIX Annual Technical Conference (ATC'03).
[34]
Dhilung Kirat, Giovanni Vigna, and Christopher Kruegel. 2014. BareCloud: Bare-metal Analysis-based Evasive Malware Detection. In Proceedings of the 23rd USENIX Conference on Security Symposium (USENIX Security'14).
[35]
Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, and Zheng Wang. 2016. Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'16).
[36]
Boris Lau. 2008. Dealing with Virtualization Obfuscators. CARO Workshop.
[37]
Mingyue Liang, Zhoujun Li, Qiang Zeng, and Zhejun Fang. 2017. Deobfuscation of Virtualization-obfuscated Code through Symbolic Execution and Compilation Optimization. In Proceedings of the 19th International Conference on Information and Communications Security (ICICS'17).
[38]
Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation (PLDI'05).
[39]
Ramya Manikyam, J. Todd McDonald, William R. Mahoney, Todd R. Andel, and Samuel H. Russ. 2016. Comparing the Effectiveness of Commercial Obfuscators Against MATE Attacks. In Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering (SSPREW'16).
[40]
Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security'17).
[41]
Jiang Ming, Dongpeng Xu, Li Wang, and Dinghao Wu. 2015. LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS'15).
[42]
Andreas Moser, Christopher Kruegel, and Engin Kirda. 2007. Exploring multiple execution paths for malware analysis. In Proceedings of the 28th IEEE Symposium on Security and Privacy (S&P'07).
[43]
Philip OKane, Sakir Sezer, and Kieran McLaughlin. 2011. Obfuscation: The Hidden Malware. IEEE Security and Privacy, Vol. 9, 5 (2011).
[44]
Oreans Technologies. 2015. Protecting Better with Code Virtualizer. http://oreans.com/codevirtualizer.php.
[45]
Oreans Technologies. last reviewed, 10/01/2017 a. Code Virtualizer: Total obfuscation against reverse engineering. http://oreans.com/codevirtualizer.php.
[46]
Oreans Technologies. last reviewed, 10/01/2017 b. Themida: Advanced Windows Software Protection System. https://www.oreans.com/themida.php.
[47]
Joshua Phillips, Vitaly Zaytsev, and Abhishek Karnik. 2009. Parasitics: The Next Generation. Kaspersky Lab Technical Report.
[48]
Ian Piumarta and Fabio Riccardi. 1998. Optimizing Direct Threaded Code by Selective Inlining. In Proceedings of the 1998 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'98).
[49]
Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontata, Fabio Gritti, and Stefano Zanero. 2017. Measuring and Defeating Anti-Instrumentation-Equipped Malware. In Proceedings of the 14th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'17).
[50]
Michalis Polychronakis. 2011. Reverse Engineering of Malware Emulators. Springer US, Chapter Encyclopedia of Cryptography and Security.
[51]
Jason Raber. 2013. Virtual Deobfuscator: Removing virtualization obfuscations from malware. Black Hat USA.
[52]
Ben Read and Jonathan Leathery. 2017. CVE-2017-0199 Used as Zero Day to Distribute FINSPY Espionage Malware and LATENTBOT Cyber Crime Malware. FireEye Threat Research Blog.
[53]
ReWolf. last reviewed, 10/01/2017. x86 Virtualizer. http://www.openrce.org/blog/view/847/x86_Virtualizer_-_source_code.
[54]
Thomas Roccia. 2017. Malware Packers Use Tricks to Avoid Analysis, Detection. McAfee Blogs.
[55]
Rolf Rolles. 2009. Unpacking virtualization obfuscators. In Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT'09).
[56]
Kevin A. Roundy and Barton P. Miller. 2013. Binary-code Obfuscations in Prevalent Packer Tools. Comput. Surveys, Vol. 46, 1 (2013).
[57]
Jonathan Salwan and Sébastien Bardin and Marie-Laure Potet. 2017. Deobfuscation of VM based software protection. In Symposium sur la sé curité des technologies de l'information et des communications (SSTIC'17).
[58]
Florent Saudel and Jonathan Salwan. 2015. Triton: A Dynamic Symbolic Execution Framework. In Symposium sur la sé curité des technologies de l'information et des communications (SSTIC'15).
[59]
Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. 2009. Automatic reverse engineering of malware emulators. In Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P'09).
[60]
Yunhe Shi, David Gregg, Andrew Beatty, and M. Anton Ertl. 2005. Virtual Machine Showdown: Stack Versus Registers. In Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments (VEE'05).
[61]
Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P'16).
[62]
Craig Smith. 2008. Creating Code Obfuscation Virtual Machines. RECON.
[63]
Jim Smith and Ravi Nair. 2005. Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
[64]
Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena. 2008. BitBlaze: A New Approach to Computer Security via Binary Analysis. In Proceedings of the 4th International Conference on Information Systems Security (ICISS'08). Keynote invited paper.
[65]
Aditya K Sood, Richard J Enbody, and Rohit Bansal. 2011. SpyEye malware infection framework. Virus Bulletin.
[66]
StrongBit Technology. last reviewed, 10/01/2017. EXECryptor: Bulletproof software protection. http://www.strongbit.com/execryptor.asp.
[67]
Zhanyong Tang, Lei Wang, Kaiyuan Kuang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, and Zheng Wang. 2017. SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation. In Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'17).
[68]
Clark Taylor and Christian Collberg. 2016. A Tool for Teaching Reverse Engineering. In Proceedings of the 2016 USENIX Workshop on Advances in Security Education.
[69]
The Enigma Protector. last reviewed, 10/01/2017. Enigma Protector: A professional system for executable files licensing and protection. http://enigmaprotector.com/.
[70]
Tora. 2012. Devirtualizing FinSpy. POC 2012.
[71]
Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, and Pablo G Bringas. 2015. SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers. In Proceedings of the 36th IEEE Symposium on Security & Privacy (S&P'15).
[72]
Julien Vanegue, Sean Heelan, and Rolf Rolles. 2012. SMT Solvers for Software Security. In Proceedings of the 6th USENIX Workshop on Offensive Technologies (WOOT'12).
[73]
VMProtect Software. last reviewed, 10/01/2017. VMProtect software protection. http://vmpsoft.com.
[74]
C. Wang, J. Davidson, J. Hill, and J. Knight. 2001. Protection of software-based survivability mechanisms. In Proceedings of International Conference on Dependable Systems and Networks (DSN'01).
[75]
Huaijun Wang, Dingyi Fang, Guanghui Li, Na An, Xiaojiang Chen, and Yuanxiang Gu. 2014. TDVMP: Improved Virtual Machine-Based Software Protection with Time Diversity. In Proceedings of the 3rd Program Protection and Reverse Engineering Workshop.
[76]
Huaijun Wang, Dingyi Fang, Guanghui Li, Xiaoyan Yin, Bo Zhang, and Yuanxiang Gu. 2013. NISLVMP: Improved Virtual Machine-Based Software Protection. In Proceedings of the 9th International Conference on Computational Intelligence and Security.
[77]
Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, and Dinghao Wu. 2016. Translingual Obfuscation. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P'16).
[78]
Zhenxiang Jim Wang. 2010. Virtual Machine Protection Technology and AV industry. CARO Workshop.
[79]
Josh Watson. 2017. An extra bit of analysis for cLEMENCy. Trail of Bits Blog.
[80]
Haijiang Xie, Yuanyuan Zhang, Juanru Li, and Dawu Gu. 2017. Nightingale: Translating Embedded VM Code in x86 Binary Executables. In Proceedings of the 20th Information Security Conference(ISC'17).
[81]
Dongpeng Xu, Jiang Ming, and Dinghao Wu. 2017. Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping. In Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P'17).
[82]
Babak Yadegari and Saumya Debray. 2015. Symbolic Execution of Obfuscated Code. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS'15).
[83]
Babak Yadegari, Brian Johannesmeyer, Ben Whitely, and Saumya Debray. 2015. A generic approach to automatic deobfuscation of executable code. In Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P'15).
[84]
Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, and Heng Yin. 2012. V2E: Combining Hardware Virtualization and Software Emulation for Transparent and Extensible Malware Analysis. In Proceedings of the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'12).
[85]
Qinghua Zhang and Douglas S. Reeves. 2007. MetaAware: Identifying Metamorphic Malware. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC'07).
[86]
Yongxin Zhou, Alec Main, Yuan X. Gu, and Harold Johnson. 2007. Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. In Proceedings of the 8th International Workshop on Information Security Applications (WISA'07).

Cited By

View all
  • (2024)LibvDiff: Library Version Difference Guided OSS Version Identification in BinariesProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623336(1-12)Online publication date: 20-May-2024
  • (2024)COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure moduleComputers & Security10.1016/j.cose.2024.104038146(104038)Online publication date: Nov-2024
  • (2023)Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation FusionInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402350066334:04(651-673)Online publication date: 11-Dec-2023
  • Show More Cited By

Index Terms

  1. VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
    October 2018
    2359 pages
    ISBN:9781450356930
    DOI:10.1145/3243734
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. binary analysis
    2. code virtualization
    3. de-obfuscation
    4. multiple granularity symbolic execution

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '18
    Sponsor:

    Acceptance Rates

    CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)276
    • Downloads (Last 6 weeks)40
    Reflects downloads up to 23 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)LibvDiff: Library Version Difference Guided OSS Version Identification in BinariesProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623336(1-12)Online publication date: 20-May-2024
    • (2024)COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure moduleComputers & Security10.1016/j.cose.2024.104038146(104038)Online publication date: Nov-2024
    • (2023)Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation FusionInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402350066334:04(651-673)Online publication date: 11-Dec-2023
    • (2023)Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics TestingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.328925418(3891-3905)Online publication date: 2023
    • (2023)ROPfuscator: Robust Obfuscation with ROP2023 IEEE Security and Privacy Workshops (SPW)10.1109/SPW59333.2023.00026(1-10)Online publication date: May-2023
    • (2023)No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58367.2023.00039(313-326)Online publication date: Jun-2023
    • (2023)A novel malware detection method based on API embedding and API parametersThe Journal of Supercomputing10.1007/s11227-023-05556-x80:2(2748-2766)Online publication date: 21-Aug-2023
    • (2023)Automated Binary Analysis: A SurveyAlgorithms and Architectures for Parallel Processing10.1007/978-3-031-22677-9_21(392-411)Online publication date: 11-Jan-2023
    • (2022)DFSGraph: Data Flow Semantic Model for Intermediate Representation Programs Based on Graph NetworkElectronics10.3390/electronics1119323011:19(3230)Online publication date: 8-Oct-2022
    • (2022)Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis FrameworksProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3545948.3545969(380-394)Online publication date: 26-Oct-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media