4.4 Article

Twinner: A framework for automated software deobfuscation

Journal

SCIENTIA IRANICA
Volume 26, Issue 6, Pages 3485-3509

Publisher

SHARIF UNIV TECHNOLOGY
DOI: 10.24200/sci.2019.21601

Keywords

Virtualization obfuscation; Malware analysis; Automated deobfuscation; Twincode generation

Ask authors/readers for more resources

Malware analysis is essential to understanding the internal logic and intent of malware programs in order to mitigate their threats. As the analysis methods have evolved, malware authors have adopted more techniques such as the virtualization obfuscation to protect the malware inner workings. This manuscript presents a framework for deobfuscating software, which abstracts the input program as much as a mathematical model of its behavior through monitoring every single operation performed during the malware execution. Also, the program is guided to run through its different execution paths automatically in order to gather as much knowledge as possible in the shortest time span. This makes it possible to find hidden logics and deobfuscate different obfuscation techniques without being dependent on their specific details. The resulting model is recoded as a C program without the artificially added complexities. This code is called a twincode and behaves in the same manner as the obfuscated binary. As a proof of concept, the proposed framework is implemented and its effectiveness is evaluated on obfuscated binaries. Program control flow graphs are inspected as a measure of successful code recovery. The performance of the proposed framework is evaluated using the set of SPEC test programs. (C) 2019 Sharif University of Technology. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available