Static Analysis of Executables to Detect Malicious Patterns

dc.contributor.authorChristodorescu, Mihaien_US
dc.contributor.authorJha, Someshen_US
dc.date.accessioned2012-03-15T17:16:46Z
dc.date.available2012-03-15T17:16:46Z
dc.date.created2003en_US
dc.date.issued2003
dc.description.abstractMalicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code detectors, such as anti-virus software. We tested the resilience of three commercial virus scanners against code obfuscation attacks. The results were surprising: the three commercial virus scanners could be subverted by very simple obfuscation transformations. We present an architecture for detecting malicious patterns in executables that is resilient to common obfuscation transformations. Experimental results demonstrate the efficacy of our prototype tool, SAFE (a static analyzer for executables).en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1467en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60332
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleStatic Analysis of Executables to Detect Malicious Patternsen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1467.pdf
Size:
2.53 MB
Format:
Adobe Portable Document Format