Computer Software
Print ISSN : 0289-6540
Binary Code Analysis for Malware with Expansive Static Analysis and Dynamic Emulation
Tomonori IZUMIDAAkira MORIKokichi FUTATSUGI
Author information
JOURNAL FREE ACCESS

2012 Volume 29 Issue 4 Pages 4_199-4_218

Details
Abstract

In this paper, we present a novel binary analysis method for malware which combines static and dynamic techniques. In the static phase, the target address of each indirect jump is resolved using backward analysis on static single assignment form of binary code. In the dynamic phase, those target addresses that are not statically resolved are recovered by way of emulation. The method is generic in the sense that it can reveal control flows of self-extracting/obfuscated code without requiring special assumptions on executables such as compliance with standard compiler models, which is requisite for the conventional methods of static binary analysis but does not hold for many malware samples. Our current attempt for using a hyperviser monitor as a dynamic analyser is also presented.

Content from these authors
© 2012 Japan Society for Software Science and Technology
Previous article Next article
feedback
Top