首页> 外文会议>Visualization for Computer Security >Visual Reverse Engineering of Binary and Data Files
【24h】

Visual Reverse Engineering of Binary and Data Files

机译:二进制和数据文件的可视反向工程

获取原文
获取原文并翻译 | 示例

摘要

The analysis of computer files poses a difficult problem for security researchers seeking to detect and analyze malicious content, software developers stress testing file formats for their products, and for other researchers seeking to understand the behavior and structure of undocumented file formats. Traditional tools, including hex editors, disassemblers and debuggers, while powerful, constrain analysis to primarily text based approaches. In this paper, we present design principles for file analysis which support meaningful investigation when there is little or no knowledge of the underlying file format, but are flexible enough to allow integration of additional semantic information, when available. We also present results from the implementation of a visual reverse engineering system based on our analysis. We validate the efficacy of both our analysis and our system with case studies depicting analysis use cases where a hex editor would be of limited value. Our results indicate that visual approaches help analysts rapidly identify files, analyze unfamiliar file structures, and gain insights that inform and complement the current suite of tools currently in use.
机译:对于试图检测和分析恶意内容的安全研究人员,软件开发人员强调对其产品的文件格式进行测试的安全研究人员以及对试图了解未记录文件格式的行为和结构的其他研究人员而言,计算机文件的分析提出了一个难题。传统工具,包括十六进制编辑器,反汇编程序和调试器,虽然功能强大,但将分析限制在主要基于文本的方法上。在本文中,我们介绍了文件分析的设计原理,这些设计原理在对底层文件格式知之甚少或根本不了解的情况下支持有意义的调查,但是足够灵活,可以在可用时集成其他语义信息。我们还将根据我们的分析提出可视逆向工程系统的实施结果。我们用案例研究验证了分析和系统的有效性,这些案例研究描述了十六进制编辑器价值有限的分析用例。我们的结果表明,可视化方法可以帮助分析人员快速识别文件,分析不熟悉的文件结构,并获得洞察力,从而为当前使用的当前工具套件提供信息和补充。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号