CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump
2014; Springer Science+Business Media; Linguagem: Inglês
10.1007/978-3-319-13257-0_32
ISSN1611-3349
Autores Tópico(s)Software Testing and Debugging Techniques
ResumoIn this paper, we present CodeXt—a novel malware code extraction framework built upon selective symbolic execution (S2E). Upon real-time detection of the attack, CodeXt is able to automatically and accurately pinpoint the exact start and boundaries of the attack code even if it is mingled with random bytes in the memory dump. CodeXt has a generic way of handling self-modifying code and multiple layers of encoding, and it can automatically extract the complete hidden and transient code protected by multiple layers of sophisticated encoders without using any signature or pattern of the decoder. To the best of our knowledge, CodeXt is the first tool that can automatically extract code protected by Metasploit’s polymorphic xor additive feedback encoder Shikata-Ga-Nai, as well as transient code protected by multi-layer incremental encoding.
Referência(s)