Evading Malware Analysis Using Reverse Execution

11/27/2021
by   Adhokshaj Mishra, et al.
0

Malware is a security threat, and various means are adapted to detect and block them. In this paper, we demonstrate a method where malware can evade malware analysis. The method is based on single-step reverse execution of code using the self-debugging feature. We discuss how self-debugging code works and use that to derive reverse execution for any payload. Further, we demonstrate the feasibility of a detection evading malware through a real implementation that targets Linux x86-64 architecture for a reference implementation. The reference implementation produces one result when run in one direction and a different result when run in the reverse direction.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/21/2014

On the Reverse Engineering of the Citadel Botnet

Citadel is an advanced information-stealing malware which targets financ...
research
08/14/2020

First Step Towards Modeling Unbreakable Malware

Currently, the construction of concealed malicious code has become a tre...
research
05/26/2021

Implementation of Live Reverse Debugging in LLDB

Debugging is an essential process with a large share of the development ...
research
09/27/2021

Casting exploit analysis as a Weird Machine reconstruction problem

Exploits constitute malware in the form of application inputs. They take...
research
09/09/2021

Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons

New types of malware are emerging at concerning rates. However, analyzin...
research
09/10/2022

GITCBot: A Novel Approach for the Next Generation of C&C Malware

Online Social Networks (OSNs) attracted millions of users in the world. ...
research
09/27/2019

LTL Model Checking of Self Modifying Code

Self modifying code is code that can modify its own instructions during ...

Please sign up or login with your details

Forgot password? Click here to reset