Paper Abstract and Keywords |
Presentation |
2013-11-12 15:10
An OEP Identifying Method based on the Order of Opcodes Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract memory areas where data was written and then executed, and decide original entry point.However, some packers repeat writing and executing data on the memory, so that there are multiple candidates of the original entry point.In this paper, we propose a detection method that decides right candidate by using the order of opcodes. Compared with malwares which have many functions, packers simply decode.Therefore we build a hypothesis that the order of opcodes have difference between original codes and packer's codes.We specify the section of original codes by machine learning, and decide original entry point by detecting first execution of the section.For machine learning, we use k-Nearest Neighbor Algorithm, and Longest Common Subsequence of extracted opcodes from each section.The experiment with 5-fold cross validation results in detecting 97.29% original entry point for 35 packers out of 48. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Malware analysis / Packer / Opcode / OEP / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 113, no. 288, ICSS2013-59, pp. 13-18, Nov. 2013. |
Paper # |
ICSS2013-59 |
Date of Issue |
2013-11-05 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2013-59 |
Conference Information |
Committee |
ICSS |
Conference Date |
2013-11-12 - 2013-11-12 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Nishijin Plaza |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Communication Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2013-11-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
An OEP Identifying Method based on the Order of Opcodes |
Sub Title (in English) |
|
Keyword(1) |
Malware analysis |
Keyword(2) |
Packer |
Keyword(3) |
Opcode |
Keyword(4) |
OEP |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Noriaki Nakamura |
1st Author's Affiliation |
Kobe University (Kobe Univ.) |
2nd Author's Name |
Masakatu Morii |
2nd Author's Affiliation |
Kobe University (Kobe Univ.) |
3rd Author's Name |
Ryoichi Isawa |
3rd Author's Affiliation |
National Institute of Infornation and Communications Technology (NICT) |
4th Author's Name |
Daisuke Inoue |
4th Author's Affiliation |
National Institute of Infornation and Communications Technology (NICT) |
5th Author's Name |
Koji Nakao |
5th Author's Affiliation |
National Institute of Infornation and Communications Technology (NICT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2013-11-12 15:10:00 |
Presentation Time |
20 minutes |
Registration for |
ICSS |
Paper # |
ICSS2013-59 |
Volume (vol) |
vol.113 |
Number (no) |
no.288 |
Page |
pp.13-18 |
#Pages |
6 |
Date of Issue |
2013-11-05 (ICSS) |
|