Presentation 2014/5/15
Proposal for Shellcode Extraction from Malicious Document File
KAZUKI IWAMOTO, MASAKI KAMIZONO, Yu TSUDA, TAKASHI TOMINE, DAISUKE INOUE, KOJI NAKAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The following document is an analysis of malicious documents which exploit vulnerability in applications dynamically, the application must have appropriate vulnerability. Therefore, we have to analyze the document statically to identify the type of vulnerability. Moreover it is difficult to identify unknown vulnerability, and the application may not be available even if we could identify the type of vulnerability. However malicious code which is executed after exploiting does not have relation with vulnerability in many cases. In this paper, we propose a method to extract and execute shellcode for analyzing malicious documents without identification of vulnerability and application.
Keyword(in Japanese) (See Japanese page)
Keyword(in English)
Paper # Vol.2014-CSEC-65 No.13,Vol.2014-IOT-25 No.13
Date of Issue

Conference Information
Committee ICM
Conference Date 2014/5/15(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication Management(ICM)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Proposal for Shellcode Extraction from Malicious Document File
Sub Title (in English)
Keyword(1)
1st Author's Name KAZUKI IWAMOTO
1st Author's Affiliation Advanced Research Laboratory, SecureBrain Corporation:Interdisciplinary Graduate School of Science and Technology, Shinshu University()
2nd Author's Name MASAKI KAMIZONO
2nd Author's Affiliation National Institute of Information and Communications Technology:Advanced Research Laboratory, SecureBrain Corporation
3rd Author's Name Yu TSUDA
3rd Author's Affiliation National Institute of Information and Communications Technology
4th Author's Name TAKASHI TOMINE
4th Author's Affiliation National Institute of Information and Communications Technology
5th Author's Name DAISUKE INOUE
5th Author's Affiliation National Institute of Information and Communications Technology
6th Author's Name KOJI NAKAO
6th Author's Affiliation National Institute of Information and Communications Technology
Date 2014/5/15
Paper # Vol.2014-CSEC-65 No.13,Vol.2014-IOT-25 No.13
Volume (vol) vol.114
Number (no) 43
Page pp.pp.-
#Pages 6
Date of Issue