Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE Malware

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Gwangyeol-
dc.contributor.authorKim, Minho-
dc.contributor.authorYi, Jeong Hyun-
dc.contributor.authorCho, Haehyun-
dc.date.accessioned2024-07-01T06:30:40Z-
dc.date.available2024-07-01T06:30:40Z-
dc.date.issued2024-06-
dc.identifier.issn2079-9292-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/49767-
dc.description.abstractOriginal Entry Point (OEP) and API obfuscation techniques greatly hinder the analysis of malware. Contemporary packers, employing these sophisticated obfuscation strategies, continue to pose unresolved challenges, despite extensive research efforts. Recent studies, like API-Xray, have mainly concentrated on rebuilding obfuscated import tables in malware, but research into OEP obfuscation is still limited. As a solution, we present Pinicorn, an automated dynamic de-obfuscation system designed to tackle these complexities. Pinicorn bypasses packers' anti-analysis techniques and retrieves the original program from memory. It is specifically designed to detect and analyze trampoline codes within both OEP and the import table. Our evaluation shows that Pinicorn successfully deobfuscates programs hidden by three different packers, confirming its effectiveness through a comparative analysis with their original versions. Furthermore, we conducted experiments on malware obfuscated by Themida and VMProtect, analyzing the obfuscation techniques and successfully de-obfuscating them to validate the effectiveness of our approach.-
dc.language영어-
dc.language.isoENG-
dc.publisherMDPI-
dc.titlePinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE Malware-
dc.typeArticle-
dc.identifier.doi10.3390/electronics13112081-
dc.identifier.bibliographicCitationELECTRONICS, v.13, no.11-
dc.identifier.wosid001245802600001-
dc.identifier.scopusid2-s2.0-85195876267-
dc.citation.number11-
dc.citation.titleELECTRONICS-
dc.citation.volume13-
dc.identifier.urlhttps://www.mdpi.com/2079-9292/13/11/2081-
dc.publisher.location스위스-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.subject.keywordAuthorOEP obfuscation-
dc.subject.keywordAuthorAPI obfuscation-
dc.subject.keywordAuthordeobfuscation-
dc.subject.keywordAuthorunpacking-
dc.subject.keywordAuthormalware analysis-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
Go to Link
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHO, HAEHYUN photo

CHO, HAEHYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE