Identifying Library Functions in Executable Files Using Patterns
نویسنده
چکیده
Re-engineering from legacy executable (binary) les is greatly facilitated by identifying and naming statically linked library functions. This paper presents an e cient method for generating les of patterns; each pattern is a transformation of the rst several bytes of a library function's executable code. Given a suitable pattern le, a candidate function can be identi ed in linear time. One pattern le is generated for each combination of compiler vendor, version, and memory model (where applicable). The process of identifying these parameters in a given executable le also identi es the main function of the program, i.e. the start of the code written by the user. The pattern les are produced automatically from a compiler's library le in a few seconds, with no user intervention required. Due to various limitations, not all library functions can be identi ed correctly; a small number will be either incorrectly identi ed or not identi ed. Optimal perfect hash functions are used to keep the pattern les compact and e cient to process.
منابع مشابه
Signatures for Library Functions in Executable Files
A method for efficiently generating signatures for detecting library functions in executable files is described. The signatures are used to automatically detect such functions in dcc, the reverse compiler at the Queensland University of Technology. Difficulties arise from the variability of the signatures, the multiplicity of library code vendors, and of memory models, and indistinguishable fun...
متن کاملIdentifying forensically uninteresting files in a large corpus
For digital forensics, eliminating the uninteresting is often more critical than finding the interesting since there is so much more of it. Published software-file hash values like those of the National Software Reference Library (NSRL) have limited scope. We discuss methods based on analysis of file context using the metadata of a large corpus. Tests were done with an international corpus of 2...
متن کاملA Fast Positive Approach of P-dpl in the Packet Inspection
The signature extraction process is based on a comparison with a common function repository. By eliminatin functions appearing in the common function repository from the signature candidate list, P-DPL can minimize the risk of false-positive detection errors. To minimize false-positive rates for P-DPL proposes intelligent candidate selection using entropy score to generate signatures. Evaluatio...
متن کاملDiscovering Malware with Time Series Shapelets
Malicious software (‘malware’) detection systems are usually signature-based and cannot stop attacks by malicious files they have never encountered. To stop these attacks, we need statistical learning approaches to identify root patterns behind execution of malware. We propose a machine learning approach for detection of malware from portable executable (PE) files. We create an ‘entropy time se...
متن کاملتحلیل تراکنشهای امانت و گردش منابع کتابخانههای دانشگاه علوم پزشکی بیرجند با الگوریتمهای دادهکاوی
Introduction: Data mining is a process for discovering meaningful relationships and patterns from data. Identify behavior patterns of libraries users can helps improve decision-making in libraries. This study aimed to analyze the interlibrary loan transactions in Birjand University of Medical Sciences using data mining algorithms. Methods: In this descriptive study, knowledge discovery and d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998