Towards Static Analysis of Virtualization-Obfuscated Binaries. / Kinder, Johannes.

Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, 2012. p. 61-70.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Documents

Abstract

Virtualization-obfuscation protects a program from manual or automated analysis by compiling it into bytecode for a randomized virtual architecture and attaching a corresponding interpreter. Static analysis appears to be helpless on such programs, where only the code of the interpreter is directly visible. In this paper, we explain the particular challenges for statically analyzing the combination of interpreter and bytecode. Static analysis for computing possible variable values is commonly precise only to the program location. In the interpreter loop, however, this combines unrelated data flow information from different locations of the bytecode program. To avoid this loss of information, we show how to lift an existing static analysis to an additional dimension of location, to become sensitive to the value of the virtual program counter. Thus, the static analysis merges data flow from equal bytecode locations only. We lift an existing analysis implemented in the \jakstab static analyzer and present preliminary results for processing a virtualization-obfuscated binary.
Original languageEnglish
Title of host publicationProc. 19th Working Conf. Reverse Engineering (WCRE 2012)
PublisherIEEE
Pages61-70
DOIs
Publication statusPublished - Oct 2012
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 17557913