As the complexity of malware grows, so does the necessity of employing program structuring mechanisms during development. While control flow structuring is often obfuscated, the dynamic data structures employed by the program are typically untouched. We report on work in progress that exploits this weakness to identify dynamic data structures present in malware samples for the purposes of aiding reverse engineering and constructing malware signatures, which may be employed for malware classification. Using a prototype implementation, which combines the type recovery tool Howard and the identification tool Data Structure Investigator (DSI), we analyze data structures in Carberp and AgoBot malware. Identifying their data structures illustrat...
Malware authors have recently begun using emulation technology to obfuscate their code. They convert...
The continuous growth of malware presents a problem for internet computing due to increasingly sophi...
In computer security, reverse engineering is understanding how a program work. It can be used for mu...
As the complexity of malware grows, so does the necessity of employing program structuring mechanism...
As the complexity of malware grows, so does the necessity of employing program structuring mechanism...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
My Ph.D. focuses on detecting malware by leveraging the information obtained at an instruction-level...
Reversing engineering of data structures involves two aspects: (1) given an application binary, infe...
Cavazos, JohnThe malware threat landscape is constantly evolving, with upwards of one million new va...
The motivation for this project is driven by evaluation of the different tools on the market that al...
Dynamic malware analysis is fast gaining popularity over static analysis since it is not easily defe...
Malware classification, specifically the task of grouping malware samples into families according to...
In the realm of this computing age, malware is becoming steadily more prevalent. With the amount of ...
Copyright © 2013 Ajit Narayanan et al.This is an open access article distributed under the Creative ...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
Malware authors have recently begun using emulation technology to obfuscate their code. They convert...
The continuous growth of malware presents a problem for internet computing due to increasingly sophi...
In computer security, reverse engineering is understanding how a program work. It can be used for mu...
As the complexity of malware grows, so does the necessity of employing program structuring mechanism...
As the complexity of malware grows, so does the necessity of employing program structuring mechanism...
Lots of work has been done on analyzing software distributed in binary form. This is a challenging p...
My Ph.D. focuses on detecting malware by leveraging the information obtained at an instruction-level...
Reversing engineering of data structures involves two aspects: (1) given an application binary, infe...
Cavazos, JohnThe malware threat landscape is constantly evolving, with upwards of one million new va...
The motivation for this project is driven by evaluation of the different tools on the market that al...
Dynamic malware analysis is fast gaining popularity over static analysis since it is not easily defe...
Malware classification, specifically the task of grouping malware samples into families according to...
In the realm of this computing age, malware is becoming steadily more prevalent. With the amount of ...
Copyright © 2013 Ajit Narayanan et al.This is an open access article distributed under the Creative ...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
Malware authors have recently begun using emulation technology to obfuscate their code. They convert...
The continuous growth of malware presents a problem for internet computing due to increasingly sophi...
In computer security, reverse engineering is understanding how a program work. It can be used for mu...