Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning

被引:7
作者
Tofighi-Shirazi, Ramtine [1 ,2 ]
Asavoae, Irina Mariuca [2 ]
Elbaz-Vincent, Philippe [1 ]
机构
[1] Univ Grenoble Alpes, CNRS, Inst Fourier, F-38000 Grenoble, France
[2] Thales Grp, Trusted Labs, Meudon, France
来源
PROCEEDINGS OF THE 9TH SOFTWARE SECURITY, PROTECTION, AND REVERSE ENGINEERING WORKSHOP 2019 (SSPREW-9) | 2019年
关键词
machine learning; ensemble learning; deobfuscation; obfuscation; reverse engineering; symbolic execution; CLASSIFICATION; MALWARE;
D O I
10.1145/3371307.3371313
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The ability to efficiently detect the software protections used is at a prime to facilitate the selection and application of adequate deobfuscation techniques. We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations. By contrast to existing work, we provide a methodology that can detect multiple layers of obfuscation, without depending on knowledge of the underlying functionality of the training-set used. We also extend our work to detect constructions of obfuscation transformations, thus providing a fine-grained methodology. To that end, we provide several studies for the best practices of the use of machine learning techniques for a scalable and efficient model. According to our experimental results and evaluations on obfuscators such as Tigress and OLLVM, our models have up to 91% accuracy on state-of-the-art obfuscation transformations. Our overall accuracies for their constructions are up to 100%.
引用
收藏
页数:12
相关论文
共 69 条
  • [1] Anckaert B., 2006, P ACM WORKSH DIG RIG, P47
  • [2] [Anonymous], 1997, Technical Report
  • [3] A Survey of Symbolic Execution Techniques
    Baldoni, Roberto
    Coppa, Emilio
    D'Elia, Daniele Cono
    Demetrescu, Camil
    Finocchi, Irene
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03) : 1 - 39
  • [4] Code Obfuscation Against Symbolic Execution Attacks
    Banescu, Sebastian
    Collberg, Christian
    Ganesh, Vijay
    Newsham, Zack
    Pretschner, Alexander
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
  • [5] Banescu S, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P661
  • [6] Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes
    Bardin, Sebastien
    David, Robin
    Marion, Jean-Yves
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 633 - 651
  • [7] Effective, efficient, and robust packing detection and classification
    Biondi, Fabrizio
    Enescu, Michael A.
    Given-Wilson, Thomas
    Legay, Axel
    Noureddine, Lamine
    Verma, Vivek
    [J]. COMPUTERS & SECURITY, 2019, 85 : 436 - 451
  • [8] Learning multi-label scene classification
    Boutell, MR
    Luo, JB
    Shen, XP
    Brown, CM
    [J]. PATTERN RECOGNITION, 2004, 37 (09) : 1757 - 1771
  • [9] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [10] Cappaert J., 2010, P 10 ANN ACM WORKSH