Abstract
|
Article Information:
A Novel Disassemble Algorithm Designed for Malicious File
Jianmin Pang, Yichi Zhang, Chao Dai, Di Sun and Qiang Wang
Corresponding Author: Jianmin Pang
Submitted: July 27, 2012
Accepted: September 17, 2012
Published: February 21, 2013 |
Abstract:
|
In order to avoid being static analyzed, hacker rely on various obfuscation techniques to hide its malicious characters. These techniques are very effective against common disassembles, preventing binary file from being disassembled correctly. The study presents novel disassemble algorithm which based on analyzed Control Flow Graph (CFG) and Data Flow Graph (DFG) information improve the ability of the disassembly. The proposed algorithm was verified on varied binary files. The experiment shows that the method not only improves the accuracy of disassemble but also greatly deal with malicious files.
Key words: Control flow graph, disassemble, obfuscation, reverse slice, , ,
|
Abstract
|
PDF
|
HTML |
|
Cite this Reference:
Jianmin Pang, Yichi Zhang, Chao Dai, Di Sun and Qiang Wang, . A Novel Disassemble Algorithm Designed for Malicious File. Research Journal of Applied Sciences, Engineering and Technology, (06): 2053-2058.
|
|
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|