Research Article | OPEN ACCESS
A Novel Disassemble Algorithm Designed for Malicious File
Jianmin Pang, Yichi Zhang, Chao Dai, Di Sun and Qiang Wang
National Digital Switching System Engineering and Technology Research Center, Zhengzhou, 450002, China
Research Journal of Applied Sciences, Engineering and Technology 2013 6:2053-2058
Received: July 27, 2012 | Accepted: September 17, 2012 | Published: February 21, 2013
Abstract
In order to avoid being static analyzed, hacker rely on various obfuscation techniques to hide its malicious characters. These techniques are very effective against common disassembles, preventing binary file from being disassembled correctly. The study presents novel disassemble algorithm which based on analyzed Control Flow Graph (CFG) and Data Flow Graph (DFG) information improve the ability of the disassembly. The proposed algorithm was verified on varied binary files. The experiment shows that the method not only improves the accuracy of disassemble but also greatly deal with malicious files.
Keywords:
Control flow graph, disassemble, obfuscation, reverse slice,
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|