Sciweavers

WCRE
2010
IEEE

Reverse Engineering Self-Modifying Code: Unpacker Extraction

13 years 10 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “packed”) form; at runtime, an unpacker routine transforms this to the original executable form of the code, which is then executed. Most of the existing work on analysis of such programs focuses on detecting unpacking and extracting the unpacked code. However, this does not shed any light on the functionality of different portions of the code so obtained, and in particular does not distinguish between code that performs unpacking and code that does not; identifying such functionality can be helpful for reverse engineering the code. This paper describes a technique for identifying and extracting the unpacker code in a self-modifying program. Our algorithm uses offline analysis of a dynamic instruction trace both to identify the point(s) where unpacking occurs and to identify and extract the corresponding unpa...
Saumya K. Debray, Jay Patel
Added 31 Jan 2011
Updated 31 Jan 2011
Type Journal
Year 2010
Where WCRE
Authors Saumya K. Debray, Jay Patel
Comments (0)