• DocumentCode
    595571
  • Title

    Code synchronization by morphological analysis

  • Author

    Bonfante, Guillaume ; Marion, J. ; Sabatier, Fabrice ; Thierry, Aurelien

  • Author_Institution
    LORIA, Univ. de Lorraine, Vandœuvre-lès-Nancy, France
  • fYear
    2012
  • fDate
    16-18 Oct. 2012
  • Firstpage
    112
  • Lastpage
    119
  • Abstract
    Reverse-engineering malware code is a difficult task, usually full of the traps put by the malware writers. Since the quality of defense softwares depends largely on the analysis of the malware, it becomes crucial to help the software investigators with automatic tools. We describe and present a tool which synchronizes two related binary programs. Our tool finds some common machine instructions between two programs and may display the correspondence instruction by instruction in IDA. Experiments were performed on many malware such as stuxnet, duqu, sality or waledac. We have rediscovered some of the links between duqu and stuxnet, and we point out OpenSSL´s use within waledac.
  • Keywords
    invasive software; reverse engineering; software tools; synchronisation; IDA instruction; OpenSSL; automatic tool; binary program; code synchronization; correspondence instruction; defense softwares; duqu; machine instruction; malware analysis; morphological analysis; reverse-engineering malware code; sality; stuxnet; waledac; Abstracts; Binary codes; Libraries; Malware; Software; Standards; Synchronization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4673-4880-5
  • Type

    conf

  • DOI
    10.1109/MALWARE.2012.6461016
  • Filename
    6461016