首页> 外文会议>Visualization for Cyber Security, 2009. VizSec 2009 >Visualizing compiled executables for malware analysis
【24h】

Visualizing compiled executables for malware analysis

机译:可视化已编译的可执行文件以进行恶意软件分析

获取原文

摘要

Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that represent the overall flow of a program. Most of the steps involve finding interesting areas of an executable and determining their overall functionality. This paper presents a method using dynamic analysis of program execution to visually represent the overall flow of a program. We use the Ether hypervisor framework to covertly monitor a program. The data is processed and presented for the reverse engineer. Using this method the amount of time needed to extract key features of an executable is greatly reduced, improving productivity. A preliminary user study indicates that the tool is useful for both new and experienced users.
机译:逆向工程编译的可执行文件是一项学习曲线陡峭的任务。将程序集转换为代表程序总体流程的一系列抽象的任务使该过程变得复杂。大多数步骤涉及查找可执行文件的有趣区域并确定其整体功能。本文提出了一种使用程序执行动态分析来直观地表示程序总体流程的方法。我们使用Ether虚拟机管理程序框架秘密监视程序。数据被处理并提供给逆向工程师。使用此方法,可以大大减少提取可执行文件关键功能所需的时间,从而提高了生产率。初步的用户研究表明,该工具对新用户和有经验的用户都有用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号