Presentation 2010-06-17
Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities, since most of the recent malwares are obfuscated by a packer in order to disturb analysis process with debuggers and dis-assemblers. Several studies have been made on automatic extraction of hidden original code, which executes a malware on an isolated environment, monitor write memory accesses and instruction fetches at runtime, determines if the code under execution is newly generated and then dump specific memory areas into a file as a candidate of the original code. However, these previous proposed techniques create many dump files as candidates of the original code so that it is difficult to identify the true original code. In this paper, we propose a method of automatically picking out the true original code from many candidates depending on the change in memory access trend before and after dumping points. To demonstrate its effectiveness, we implement our proposed system and evaluate it with five malwares packed by five different packers. Our experiment data shows our proposed method achieves finding the original entry points of four malwares and getting original code of all five malwares.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Malware / Unpacking / OEP / Virtual Machine Monitor / Memory Access Trace
Paper # IA2010-3,ICSS2010-3
Date of Issue

Conference Information
Committee IA
Conference Date 2010/6/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Automatic OEP Finding Method for Malware Unpacking
Sub Title (in English)
Keyword(1) Malware
Keyword(2) Unpacking
Keyword(3) OEP
Keyword(4) Virtual Machine Monitor
Keyword(5) Memory Access Trace
1st Author's Name Yuhei Kawakoya
1st Author's Affiliation NTT Information Sharing and Platform Laboratories()
2nd Author's Name Makoto Iwamura
2nd Author's Affiliation NTT Information Sharing and Platform Laboratories
3rd Author's Name Mitsutaka Itoh
3rd Author's Affiliation NTT Information Sharing and Platform Laboratories
Date 2010-06-17
Paper # IA2010-3,ICSS2010-3
Volume (vol) vol.110
Number (no) 78
Page pp.pp.-
#Pages 6
Date of Issue