Home > Research > Publications & Outputs > SEEAD

Electronic data

  • SeeAD

    Rights statement: ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 294 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation. / Tang, Zhanyong; Wang, Lei; Kuang, Kaiyuan et al.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, 2017. p. 261-268.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Tang, Z, Wang, L, Kuang, K, Xue, C, Gong, X, Chen, X, Fang, D & Wang, Z 2017, SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation. in 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, pp. 261-268. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.246

APA

Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D., & Wang, Z. (2017). SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation. In 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) (pp. 261-268). IEEE. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.246

Vancouver

Tang Z, Wang L, Kuang K, Xue C, Gong X, Chen X et al. SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation. In 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE. 2017. p. 261-268 doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.246

Author

Tang, Zhanyong ; Wang, Lei ; Kuang, Kaiyuan et al. / SEEAD : A Semantic-based Approach for Automatic Binary Code De-obfuscation. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, 2017. pp. 261-268

Bibtex

@inproceedings{2dd2e719751d4d1aafa77a7be5dc6dc7,
title = "SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation",
abstract = "Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs. As a result, these approaches often fail to discover hidden malicious patterns. This paper introduces SEEAD, a novel and generic semantic-based de-obfuscation system. When building SEEAD, we try to rely on as few assumptions about the structure of the obfuscation tool as possible, so that the system can keep pace with the fast evolving code obfuscation techniques. To increase the code coverage, SEEAD dynamically directs the target program to execute different paths across different runs. This dynamic profiling scheme is rife with taint and control dependence analysis to reduce the search overhead, and a carefully designed protection scheme to bring the program to an error free status should any error happens during dynamic profile runs. As a result, the increased code coverage enables us to uncover hidden malicious behaviors that are not detected by traditional dynamic analysis based de-obfuscation approaches. We evaluate SEEAD on a range of benign and malicious obfuscated programs. Our experimental results show that SEEAD is able to successfully recover the original logic from obfuscated binaries.",
author = "Zhanyong Tang and Lei Wang and Kaiyuan Kuang and Chao Xue and Xiaoqing Gong and Xiaojiang Chen and Dingyi Fang and Zheng Wang",
note = "{\textcopyright}2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.",
year = "2017",
month = sep,
day = "11",
doi = "10.1109/Trustcom/BigDataSE/ICESS.2017.246",
language = "English",
isbn = "9781509049073",
pages = "261--268",
booktitle = "16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - SEEAD

T2 - A Semantic-based Approach for Automatic Binary Code De-obfuscation

AU - Tang, Zhanyong

AU - Wang, Lei

AU - Kuang, Kaiyuan

AU - Xue, Chao

AU - Gong, Xiaoqing

AU - Chen, Xiaojiang

AU - Fang, Dingyi

AU - Wang, Zheng

N1 - ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2017/9/11

Y1 - 2017/9/11

N2 - Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs. As a result, these approaches often fail to discover hidden malicious patterns. This paper introduces SEEAD, a novel and generic semantic-based de-obfuscation system. When building SEEAD, we try to rely on as few assumptions about the structure of the obfuscation tool as possible, so that the system can keep pace with the fast evolving code obfuscation techniques. To increase the code coverage, SEEAD dynamically directs the target program to execute different paths across different runs. This dynamic profiling scheme is rife with taint and control dependence analysis to reduce the search overhead, and a carefully designed protection scheme to bring the program to an error free status should any error happens during dynamic profile runs. As a result, the increased code coverage enables us to uncover hidden malicious behaviors that are not detected by traditional dynamic analysis based de-obfuscation approaches. We evaluate SEEAD on a range of benign and malicious obfuscated programs. Our experimental results show that SEEAD is able to successfully recover the original logic from obfuscated binaries.

AB - Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs. As a result, these approaches often fail to discover hidden malicious patterns. This paper introduces SEEAD, a novel and generic semantic-based de-obfuscation system. When building SEEAD, we try to rely on as few assumptions about the structure of the obfuscation tool as possible, so that the system can keep pace with the fast evolving code obfuscation techniques. To increase the code coverage, SEEAD dynamically directs the target program to execute different paths across different runs. This dynamic profiling scheme is rife with taint and control dependence analysis to reduce the search overhead, and a carefully designed protection scheme to bring the program to an error free status should any error happens during dynamic profile runs. As a result, the increased code coverage enables us to uncover hidden malicious behaviors that are not detected by traditional dynamic analysis based de-obfuscation approaches. We evaluate SEEAD on a range of benign and malicious obfuscated programs. Our experimental results show that SEEAD is able to successfully recover the original logic from obfuscated binaries.

U2 - 10.1109/Trustcom/BigDataSE/ICESS.2017.246

DO - 10.1109/Trustcom/BigDataSE/ICESS.2017.246

M3 - Conference contribution/Paper

SN - 9781509049073

SP - 261

EP - 268

BT - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17)

PB - IEEE

ER -