DocumentCode
560385
Title
A Study of Advanced Hybrid Execution Using Reverse Traversal
Author
Jang, Seongsoo ; Kim, Ho-Yeon ; Choi, Young-Hyun ; Chung, Tai-Myoung
Author_Institution
Dept. of Electr. & Comput. Eng., Sungkyunkwan Univ., Suwon, South Korea
Volume
2
fYear
2011
fDate
26-27 Nov. 2011
Firstpage
557
Lastpage
559
Abstract
As software analysis techniques have been developed, lots of software analysis tools and anti-malware programs now can easily detect various kinds of malware. However, techniques for avoiding software analysis are also being developed. Polymorphic malware and obfuscated malware use those kinds of techniques, and they cause enormous damage to computer systems all over the world. In this paper, therefore, we suggest advanced hybrid execution using reverse traversal to examine advanced malware. The method we suggest reads in the whole program, creates control flow graph, and traces all the execution paths reversely, so that infeasible paths can also be detected. By traversing the whole execution paths, including infeasible paths, we can sense hidden vulnerabilities. Although we anticipate huge overhead when tracing all the execution paths, multi-core processing is expected to alleviate the overhead.
Keywords
flow graphs; invasive software; multiprocessing systems; program diagnostics; software tools; advanced hybrid execution; anti-malware programs; computer systems; control flow graph; execution paths; infeasible paths; multicore processing; obfuscated malware; polymorphic malware; reverse traversal; software analysis techniques; Computers; Concrete; Conferences; Malware; Software; Software testing; Hybrid Execution; Reverse Traversal; Software Analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Management, Innovation Management and Industrial Engineering (ICIII), 2011 International Conference on
Conference_Location
Shenzhen
Print_ISBN
978-1-61284-450-3
Type
conf
DOI
10.1109/ICIII.2011.278
Filename
6116767
Link To Document