• DocumentCode
    2934124
  • Title

    The New Technique of Decompilation and Its Application in Information Security

  • Author

    Shudrak, Maxim ; Zolotarev, Valeriy

  • Author_Institution
    Inst. of Comput. Sci. & Telecommun., Siberian State Aerosp. Univ. (SibSAU), Krasnoyarsk, Russia
  • fYear
    2012
  • fDate
    14-16 Nov. 2012
  • Firstpage
    115
  • Lastpage
    120
  • Abstract
    The article describes a new technique of binary code decompilation and its applicability in information security such as software protection against reverse engineering and code obfuscation analysis in malware. The basic idea of the article is the fact that the process of binary code decompilation doesn´t require a machine code representation in source code view. The authors propose original decompilation technique based on restoration of code section algorithm. The technique uses a serial interpretation of binary code into intermediate code, analysis of program control flow and code transformation in the algorithmic form. The results are applied to the problem of malware obfuscation analyze and software protection against unauthorized reverse engineering. To solve the first problem, we used a serial algorithm for analysis of the resources used by the virus and the functional control flow separation. For solving the second problem we was also used analysis of the basic program control flow algorithm and additional threads to obfuscate the program and protect it against unauthorized reverse engineering.
  • Keywords
    data flow analysis; invasive software; reverse engineering; binary code decompilation technique; binary code serial interpretation; code obfuscation analysis; code section algorithm restoration; code transformation analysis; functional control flow separation; information security; intermediate code; malware obfuscation analyze problem; program control flow analysis; software protection; unauthorized reverse engineering; Algorithm design and analysis; Binary codes; Generators; Malware; Registers; Software; Software algorithms; binary code; decomilation; malware; software protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Modeling and Simulation (EMS), 2012 Sixth UKSim/AMSS European Symposium on
  • Conference_Location
    Valetta
  • Print_ISBN
    978-1-4673-4977-2
  • Type

    conf

  • DOI
    10.1109/EMS.2012.20
  • Filename
    6410138