著者
HyungChanKim Daisuke Inoue Masashi Eto JungsukSongKojiNakao
雑誌
コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集
巻号頁・発行日
vol.2009, pp.1-6, 2011-10-12

In these days, it is very prevalent to discover many packed malwares caught inany malware collecting systems including honeypots. Thus, the initial step for usual malwareanalysis involves unpacking binary samples. In this paper, we present a yet another methodof generic binary unpacking. A typical packed binary includes stub code that takes chargeof unrolling packed data at the early stage of program execution thereby realizing originalexecution context. Our approach is basically to measure code revelation/concealment based onbyte state model that reflects the behavior of such stub code. We also describe a proof-of-conceptimplementation based on Bochs x86 system emulator.