Mal-XT: Higher accuracy hidden-code extraction of packed binary executable

Charles Lim, Suryadi, Kalamullah Ramli, Suhandi

Research output: Contribution to journalConference articlepeer-review

Abstract

Malware authors often use binary packers to hinder the malicious code from reverse-engineered by malware analyst. There have been many studies done on providing different approaches on unpacking the packed binary executable. Our previous works have successfully relied on the written memory section size as an indicator to extract hidden-code during the unpacking process. This paper enhances our previous work by locating executed instruction in the written memory section to provide a more precise memory location in extracting hidden code from the packed binary executable. The result of our experiments exhibits higher similarity result for all packers and benign applications compared to our previous works.

Original languageEnglish
Article number012001
JournalIOP Conference Series: Materials Science and Engineering
Volume453
Issue number1
DOIs
Publication statusPublished - 29 Nov 2018
Event1st International Conference on Design, Engineering and Computer Sciences 2018, ICDECS 2018 - Jakarta, Indonesia
Duration: 9 Aug 2018 → …

Fingerprint

Dive into the research topics of 'Mal-XT: Higher accuracy hidden-code extraction of packed binary executable'. Together they form a unique fingerprint.

Cite this