Using reverse Engineering to Face Malware

被引:0
作者
Sanchez Venegas, Carlos Andres [1 ]
Aguado Bedoya, Camilo [1 ]
Diaz Lopez, Daniel Orlando [1 ]
Garcia Ruiz, Juan Carlos Camilo [2 ]
机构
[1] Escuela Colombiana Ingn Julio Garavito, Bogota, Colombia
[2] Armada Nacl, Bogota, Colombia
来源
INGENIERIA SOLIDARIA | 2019年 / 15卷 / 28期
关键词
Reverse engineering; Radare; Sandboxing; Yara rules; Malware analysis;
D O I
10.16925/2357-6014.2019.02.02
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper is a product of the research Project "Cyber Security Architecture for Incident Management" developed in the Colombian School of Engineering Julio Garavito in the year 2018. Introduction: Reverse engineering involves deconstructing and extracting knowledge about objects. The use of reverse engineering in malware analysis is extremely useful in understanding the functionalities and purposes of a suspicious sample. Methods: This paper makes use of Radare which is one of the most popular open source tools for reverse engineering, with the aim of dealing with malware. Results: A use case related to hacking of anti-sandbox malware is presented, in such a way that it is possible to analyze the behavior of the sample using a sandbox. Additionally, another use case is presented, where an in-depth analysis of a malicious Android application aimed to the audience of a popular event (FIFA World Cup 2018) is developed, making it possible to demonstrate the relevance of reverse engineering techniques in end-user protection strategies. Conclusions: This paper shows how the results of a reverse engineering process can be integrated with Yara rules, allowing for the detection of malware on the fly, and it also shows an alternative to automatically generating Yara rules through the yarGen generator. Originality: Use of Open Source reversing solutions by Colombian Law Enforcement Agencies has not been discussed previously, making this paper a notable element toward the modernization of the military forces. Limitation: Different approaches and perspectives about the limitations in the use of reverse engineering by Law Enforcement Agencies are also shared.
引用
收藏
页数:26
相关论文
共 25 条
[1]  
Abad-Aramburu C., 2015, APLICACION METODOLOG, P2
[2]  
[Anonymous], 2018, 2018 SONICWALL CYBER
[3]  
Aptoide S.A, APTOIDE DESCARGA ENC
[4]  
Balzarotti D., 2012, RES ATTACKS INTRUSIO, V7462, P400, DOI [10.1007/978-3-642-33338-5, DOI 10.1007/978-3-642-33338-5]
[5]  
Christodorescu M, 2007, ADV INFORM SECUR, P193
[6]  
Drake J. J., 2014, ANDROID HACKERS HDB, P577
[7]  
Dubkey A., 2016, ANDROID SECURITY ATT, P280
[8]  
Dunham K., 2014, Android malware and analysis, DOI [10.1201/b17598, DOI 10.1201/B17598]
[9]  
Dunham K., 2008, MOBILE MALWARE ATTAC, P440
[10]  
Eagle Chris., 2011, The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler, P672