Abstract
Malicious code often use a variety of anti-analysis and anti-tampering defenses to hinder analysis. Researchers trying to understand the internal logic of the malware have to penetrate these defenses. Existing research on such anti-analysis defenses tend to study them in isolation, thereby failing to see underlying conceptual similarities between different kinds of anti-analysis defenses. This paper proposes an information-flow-based framework that encompasses a wide variety of anti-analysis defenses. We illustrate the utility of our approach using two different instances of this framework: self-checksumming-based anti-tampering defenses and timing-based emulator detection. Our approach can provide insights into the underlying structure of various anti-analysis defenses and thereby help devise techniques for neutralizing them.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW 2014 |
| Publisher | Association for Computing Machinery |
| ISBN (Electronic) | 9781605586373 |
| DOIs | |
| Publication status | Published - 9 Dec 2014 |
| Externally published | Yes |
| Event | 4th Program Protection and Reverse Engineering Workshop, PPREW 2014 - New Orleans, United States Duration: 9 Dec 2014 → … |
Publication series
| Name | ACM International Conference Proceeding Series |
|---|---|
| Volume | 12-December-2014 |
Conference
| Conference | 4th Program Protection and Reverse Engineering Workshop, PPREW 2014 |
|---|---|
| Country/Territory | United States |
| City | New Orleans |
| Period | 9/12/14 → … |
Funding
This research was supported in part by the Air Force Office of Scientific Research (AFOSR) under grant no. FA9550-11-1-0191 and the National Science Foundation (NSF) under grants CNS-1115829, CNS-1145913, III-1318343, and CNS-1318955. This research was also funded by National Natural Science Foundation of China (NSFC) 61173021. The opinions, findings, and conclusions expressed in this paper are solely those of the authors and do not necessarily reflect the views of AFOSR, NSF or NSFC.
Keywords
- Anti-analysis defense
- Sefl-checksumming
- Taint analysis
- Timing defense