Malware Analysis and Static Call Graph Generation with Radare2

نویسندگان

چکیده

"A powerful feature used in automated malware analysis is the static call graph of executable file. Elimination sandbox environment, fast scan, function patterns beyond instruction level information – all these motivate prevalence feature. Processing and storing malicious samples a scaled manner facilitates application complex network research. IDA Pro one leading disassembler tools industry can generate via GenCallGdl GenFuncGdl APIs tool which was our previous works. In this paper an alternative method presented using another tool, Radare2, open-source Unixbased software, also frequently domain. Radare2 has Python support (among other languages), r2pipe package, thus enabling full scalability on Linux-based servers containerized solutions. This offers detailed technical description how to use PE file thorough comparison with output Pro, as well public dataset experiments were carried out. 2010 Mathematics Subject Classification. 68P25, 68P30. 1998 CR Categories Descriptors. D.4.6 [Security Protection]: Subtopic Invasive software. Key words phrases. analysis, graph, radare2, Pro."

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Metamorphic Malware Detection Using Function Call Graph Analysis

Previous work has shown that well-designed metamorphicmalware can evade many commonly-used malware detection techniques, including signature scanning. In this paper, we consider a previously developed score which is based on function call graph analysis. We test this score on challenging classes of metamorphic malware and we show that the resulting detection rates yield an improvement over othe...

متن کامل

Code Definition Analysis for Call Graph Generation

Enterprise level software is implemented using multi-layer architecture. These layers are often implemented using decoupled solutions with millions of lines of code. Programmers often have to track and debug a function call from user interface layer to the data access layer while troubleshooting an issue. They have to inspect the code based on search results or use design documents to construct...

متن کامل

Mapping Using Static Call Graph Estimation

As the gap between memory and processor performance continues to grow, it becomes increasingly important to exploit cache memory e ectively. One technique used by compiler and linkers to improve the performance of the cache is code reordering. Code reordering optimizations rearrange a program so that sections of the program with temporal locality will be placed next to each other in the nal pro...

متن کامل

Mapping Using Static Call Graph EstimationAmir

As the gap between memory and processor performance continues to grow, it becomes increasingly important to exploit cache memory eeectively. One technique used by compiler and linkers to improve the performance of the cache is code reordering. Code reordering optimizations rearrange a program so that sections of the program with temporal locality will be placed next to each other in the nal pro...

متن کامل

Eecient Call Graph Analysis Eecient Call Graph Analysis

We present an eecient algorithm for computing the procedure call graph, the program representation underlying most interprocedural optimization techniques. The algorithm computes the possible bindings of procedure variables in languages where such variables only receive their values through parameter passing, such as Fortran. We extend the algorithm to accommodate a limited form of assignments ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Studia Universitatis Babes-Bolyai: Series Informatica

سال: 2023

ISSN: ['2065-9601', '1224-869X']

DOI: https://doi.org/10.24193/subbi.2023.1.01