Experiences in Instrumented Binary Analysis for Malware
Software armoring techniques has been causing problems in malware analysis. It obscures and protects malware codes; making analysis difficult to be conducted. As more malware is armed, new method is required to make analysis easier and faster. In this paper, we introduced an automated-method
to detect malware unpacking activities using dynamic binary instrumentation. It used bi-gram analysis and fine grained analysis tracking to monitor execution. Our results using off-the-shelf packing tools on both packed malware and packed binary showed that dynamic binary instrumentation can
be used as a powerful tool to track obfuscated binaries.
Keywords: Dynamic Binary Instrumentation; Malware Analysis; Packing
Document Type: Research Article
Affiliations: 1: Department of Information Technology, Swiss German University, BSD City, Tangerang 15339, Indonesia 2: Department of Mathematics, Universitas Indonesia, Kampus UI, Depok 16424, Indonesia 3: Electrical Engineering Department, Universitas Indonesia, Kampus UI, Depok 16424, Indonesia
Publication date: 01 October 2015
- ADVANCED SCIENCE LETTERS is an international peer-reviewed journal with a very wide-ranging coverage, consolidates research activities in all areas of (1) Physical Sciences, (2) Biological Sciences, (3) Mathematical Sciences, (4) Engineering, (5) Computer and Information Sciences, and (6) Geosciences to publish original short communications, full research papers and timely brief (mini) reviews with authors photo and biography encompassing the basic and applied research and current developments in educational aspects of these scientific areas.
- Editorial Board
- Information for Authors
- Subscribe to this Title
- Ingenta Connect is not responsible for the content or availability of external websites
- Access Key
- Free content
- Partial Free content
- New content
- Open access content
- Partial Open access content
- Subscribed content
- Partial Subscribed content
- Free trial content