Header menu link for other important links
X
Evaluating model checking for cyber threats code obfuscation identification
Martinelli F, Mercaldo F, Nardone V, Santone A, , Cimitile A.
Published in Elsevier BV
2018
Volume: 119
   
Pages: 203 - 218
Abstract
Code obfuscation is a set of transformations that make code programs harder to understand. The goal of code obfuscation is to make reverse engineering of programs infeasible, while maintaining the logic on the program. Originally, it has been used to protect intellectual property. However, recently code obfuscation has been also used by malware writers in order to make cyber threats easily able to evade antimalware scanners. As a matter of fact, metamorphic and polymorphic viruses exhibit the ability to obfuscate their code as they propagate. In this paper we propose a model checking-based approach which is able to identify the most widespread obfuscating techniques, without making any assumptions about the nature of the obfuscations used. We evaluate the proposed method on a real-world dataset obtaining an accuracy equal to 0.9 in the identification of obfuscation techniques. © 2018 Elsevier Inc.
About the journal
JournalData powered by TypesetJournal of Parallel and Distributed Computing
PublisherData powered by TypesetElsevier BV
ISSN0743-7315
Open Access0