Static Analysis of Software Executables

被引:2
|
作者
Melski, David
Teitelbaum, Tim
Reps, Thomas
机构
关键词
D O I
10.1109/CATCH.2009.42
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, there has been a growing need for tools that an analyst can use to understand the workings of COTS software as well as malicious code. Static analysis provides techniques that can help with such problems; however, there are several obstacles that must be overcome, including the absence of source code and the difficulty of analysing machine code We have created CodeSurfer/x86, a prototype tool for browsing, inspecting, and analyzing x86 executables. From an x86 executable. CodeSurfer/x86 recovers intermediate representations that are similar to what would be created by a complier for a program written in a high-level language. These facilities provide a platform for the development of additional tools for analyzing the security properties of executables. CodeSurfer/x86 analyses are automatically generated from a formal specification of the x86 instruction semantics. This makes the analyses more accurate and robust, and makes it easier to retarget the tool to analyze executables for other platforms besides x863.
引用
收藏
页码:97 / 102
页数:6
相关论文
共 50 条
  • [1] Static analysis of executables to detect malicious patterns
    Christodorescu, M
    Jha, S
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 169 - 186
  • [2] Static Analysis of Executables for Collaborative Malware Detection on Android
    Schmidt, Aubrey-Derrick
    Bye, Rainer
    Schmidt, Hans-Gunther
    Clausen, Jan
    Kiraz, Osman
    Yueksel, Kamer A.
    Camtepe, Seyit A.
    Albayrak, Sahin
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 631 - +
  • [3] Static Analyzer of Vicious Executables (SAVE)
    Department of Computer Science, New Mexico Tech, Socorro, NM 87801, United States
    不详
    Applied Computer Security Associates, 1600, 326-334 (2004):
  • [4] Interprocedural static slicing of binary executables
    Kiss, A
    Jász, J
    Lehotai, G
    Gyimóthy, T
    THIRD IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION - PROCEEDINGS, 2003, : 118 - 127
  • [5] Cryfind : Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables
    Chao, Wei Chieh
    Chen, Chung-Kuan
    Cheng, Chen-Mou
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [6] A static API birthmark for Windows binary executables
    Choi, Seokwoo
    Park, Heewan
    Lim, Hyun-il
    Han, Taisook
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (05) : 862 - 873
  • [7] Mostly Static Program Partitioning of Binary Executables
    Yardimci, Efe
    Franz, Michael
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2009, 31 (05):
  • [8] Static analysis on x86 executables for preventing automatic mimicry attacks
    Bruschi, Danilo
    Cavallaro, Lorenzo
    Lanzi, Andrea
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2007, 4579 : 213 - +
  • [9] A Static Birthmark of Windows Binary Executables based on Strings
    Kim, Yesol
    Moon, Jeongoh
    Kim, Dongjin
    Jeong, Younsik
    Cho, Seong-Je
    Park, Minkyu
    Han, Sangchul
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 734 - 738
  • [10] TYPESQUEEZER: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis
    Lin, Ziyi
    Li, Jinku
    Li, Bowen
    Ma, Haoyu
    Gao, Debin
    Ma, Jianfeng
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2725 - 2739