Code obfuscation is a set of transformations that make code programs harder to understand. The goal of code obfuscation is to make reverse engineering of programs infeasible, while maintaining the logic on the program. Originally, it has been used to protect intellectual property. However, recently code obfuscation has been also used by malware writers in order to make cyber threats easily able to evade antimalware scanners. As a matter of fact, metamorphic and polymorphic viruses exhibit the ability to obfuscate their code as they propagate. In this paper we propose a model checking-based approach which is able to identify the most widespread obfuscating techniques, without making any assumptions about the nature of the obfuscations used. We evaluate the proposed method on a real-world dataset obtaining an accuracy equal to 0.9 in the identification of obfuscation techniques.
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1016/j.jpdc.2018.04.008|
|Codice identificativo ISI:||WOS:000435425500017|
|Codice identificativo Scopus:||2-s2.0-85047166991|
|Titolo:||Evaluating model checking for cyber threats code obfuscation identification|
|Appare nelle tipologie:||1.1 Articolo in rivista|