Browse > Article
http://dx.doi.org/10.17661/jkiiect.2018.11.6.724

Code Automatic Analysis Technique for Virtualization-based Obfuscation and Deobfuscation  

Kim, Soon-Gohn (School of Software Engineering, Joongbu University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.11, no.6, 2018 , pp. 724-731 More about this Journal
Abstract
Code obfuscation is a technology that makes programs difficult to understand for the purpose of interpreting programs or preventing forgery or tampering. Inverse reading is a technology that analyzes the meaning of origin through reverse engineering technology by receiving obfuscated programs as input. This paper is an analysis of obfuscation and reverse-toxicization technologies for binary code in a virtualized-based environment. Based on VMAttack, a detailed analysis of static code analysis, dynamic code analysis, and optimization techniques were analyzed specifically for obfuscation and reverse-dipidization techniques before obfuscating and reverse-dipulation techniques. Through this thesis, we expect to be able to carry out various research on virtualization and obfuscation. In particular, it is expected that research from stack-based virtual machines can be attempted by adding capabilities to enable them to run on register-based virtual machines.
Keywords
Virtialization; Obfuscation; Deobfuscation; Static code Analysis; Dynamic Code Analysis;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Johannes Kinder, "Towards static analysis of virtualization obfuscated binaries," In 2012 19th Working Conference on Reverse Engineering. IEEE, pp.61-70, 2012
2 Jasvir Nagra and Christian Collberg, "Surreptitious Software: Obfuscation, Watermarking, and Tamper proofing for Software Protection," Pearson Education, 2009.
3 Rolf Rolles, "Unpacking Virtualization Obfuscators," In Proceedings of the 3rd USENIX Conference on Offensive Technologies(WOOT'09), USENIX, 2009.
4 Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, and Wenke Lee, "Automatic Reverse Engineering of Malware Emulators," In 30th IEEE Symposium on Security and Privacy (S&P 2009), May 2009
5 Hiralal Agrawal and Joseph R Horgan, "Dynamic program slicing," In ACM SIGPlan Notices, Vol. 25. ACM, pp.246-256, 2009.
6 Bertrand Anckaert, Mariusz Jakubowski, and Ramarathnam Venkatesan, "Proteus: virtualization for diversified tamperresistance," In Proceedings of the ACM workshop on Digital rights management. ACM, pp.47-58, 2007.
7 Choi Do-Hyeon, Jung Oh Park, ' A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm', The Journal of The Institute of Internet, Broadcasting and Communication VOL. 16 No. 6, 2016