|
This article is cited in 1 scientific paper (total in 1 paper)
The application of compiler-based obfuscation and diversification for program signature modification
A. R. Nurmukhametov Institute for System Programming of the Russian Academy of Sciences
Abstract:
Development of malware detection techniques leads to the evolution of anti-detection techniques. In this paper we discuss possibility of creating an automatic tool for signature modification. In this article we describe our experience in designing and development of such tool. For signature modification in Linux programs we implemented a tool based on LLVM compiler infrastructure and for Windows programs we used post-link instrumentation and optimization tool Syzygy. The former approach requires program source code, while the latter assumes only the presence of debug information. Diversifying and obfuscating transformations were implemented in both cases with the aim of changing the signature of program to prevent matching them the known patterns. Implemented transformations are bogus code insertion, function permutation, instruction substitution, ciphering of constant buffer. As a result we demonstrate proof-of-concept examples which confirm that it is possible to automatically change of program signature for avoiding detection by signature-based analysis. Furthermore we explain drawbacks of this technique and discuss the further ways of development.
Keywords:
diversification, obfuscation, signature analysis.
Citation:
A. R. Nurmukhametov, “The application of compiler-based obfuscation and diversification for program signature modification”, Proceedings of ISP RAS, 28:5 (2016), 93–104
Linking options:
https://www.mathnet.ru/eng/tisp69 https://www.mathnet.ru/eng/tisp/v28/i5/p93
|
Statistics & downloads: |
Abstract page: | 201 | Full-text PDF : | 140 | References: | 45 |
|