Machine Learning Classification of Obfuscation using Image Visualization

被引:2
作者
Parker, Colby B. [1 ]
McDonald, J. Todd [1 ]
Damopoulos, Dimitrios [1 ]
机构
[1] Univ S Alabama, Dept Comp Sci, Mobile, AL 36688 USA
来源
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2021年
基金
美国国家科学基金会;
关键词
Software Protection; MATE Attacks; Code Visualization; Neural Networks; Obfuscation;
D O I
10.5220/0010607408540859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the need for new techniques to analyze obfuscated software has grown, recent work has shown the ability to analyze programs via machine learning in order to perform automated metadata recovery. Often these techniques really on disassembly or other means of direct code analysis. We showcase an approach combining code visualization and image analysis via convolutional neural networks capable of statically classifying obfuscation transformations. By first turning samples into gray scale images, we are able to analyze the structure and side effects of transformations used in the software with no heavy code analysis or feature preparation. With experimental results samples produced with the Tigress and OLLVM obfuscators, our models are capable of labeling transformations with F1-scores between 90% and 100% across all tests. We showcase our approach via models designed as both a binary classification problem as well as a multi label and multi output problem. We retain high performance even in the presence of multiple transformations in a file.
引用
收藏
页码:854 / 859
页数:6
相关论文
共 22 条
  • [1] Albawi S, 2017, I C ENG TECHNOL
  • [2] Code Obfuscation Against Symbolic Execution Attacks
    Banescu, Sebastian
    Collberg, Christian
    Ganesh, Vijay
    Newsham, Zack
    Pretschner, Alexander
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
  • [3] Banescu S, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P661
  • [4] Bensaoud A., 2020, International Journal of Network Security, V22, P1022
  • [5] Bishop C.M., 2006, Pattern Recognition and Machine Learning
  • [6] Collberg C., 2009, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
  • [7] Coogan K, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P275
  • [8] Jones L, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P155, DOI 10.1109/CCWC.2018.8301720
  • [9] Obfuscator-LLVM - Software Protection for the Masses
    Junod, Pascal
    Rinaldini, Julien
    Wehrli, Johan
    Michielin, Julie
    [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO), 2015, : 3 - 9
  • [10] Kabanga E. K., 2017, J COMP COM, V6