DocumentCode :
2965527
Title :
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Author :
Royal, Paul ; Halpin, Mitch ; Dagon, David ; Edmonds, Robert ; Lee, Wenke
Author_Institution :
Georgia Institute of Technology, USA
fYear :
2006
fDate :
Dec. 2006
Firstpage :
289
Lastpage :
300
Abstract :
Modern malware often hide the malicious portion of their program code by making it appear as data at compile-time and transforming it back into executable code at runtime. This obfuscation technique poses obstacles to researchers who want to understand the malicious behavior of new or unknown malware and to practitioners who want to create models of detection and methods of recovery. In this paper we propose a technique for automating the process of extracting the hidden-code bodies of this class of malware. Our approach is based on the observation that sequences of packed or hidden code in a malware instance can be made self-identifying when its runtime execution is checked against its static code model. In deriving our technique, we formally define the unpack-executing behavior that such malware exhibits and devise an algorithm for identifying and extracting its hidden-code. We also provide details of the implementation and evaluation of our extraction technique; the results from our experiments on several thousand malware binaries show our approach can be used to significantly reduce the time required to analyze such malware, and to improve the performance of malware detection tools.
Keywords :
Computer viruses; Computer worms; Concrete; Cryptography; Data mining; Educational institutions; Information security; Performance analysis; Runtime; Viruses (medical);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual
Conference_Location :
Miami Beach, FL, USA
ISSN :
1063-9527
Print_ISBN :
0-7695-2716-7
Type :
conf
DOI :
10.1109/ACSAC.2006.38
Filename :
4041175
Link To Document :
بازگشت