Poster: Atoms of Style: Identifying the Authors of Program Binaries

نویسندگان

  • Chris McKnight
  • Kritika Iyer
  • Ian Goldberg
  • David R. Cheriton
چکیده

Being able to identify the author of a program has many applications in both academic and commercial environments. In most use cases, the source code is readily available, and this is reflected in the literature, as previous work has mostly focused on source code analyses. In contrast, scant research has been carried out on identifying the authors of executable program binaries. This would be most applicable to the analysis of malware, but it also has applications in other areas, such as the evaluation of code obfuscators. Our research builds on and extends the work of previous studies on source code analysis to the realm of executable binaries. We take the approach of initially reverse engineering the executable code to extract a source code representation, before applying deanonymization techniques and analyzing the results. Our reasons for reverse engineering are to use the results to better understand whether elements of style are preserved through compilation, and of those, which are instrumental in identifying authors. Our preliminary results suggest that some logical stylistic features remain after compilation, however there is far less variety in these features due in part to the loss of information after compiling, which goes beyond loss of indentation, comments and naming conventions. However, the results provide some encouragement that accuracy can be improved given a more detailed investigation and experimentation with different feature sets.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Who Wrote This Code? Identifying the Authors of Program Binaries

Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, and malware analysis. Authorship attribution is challenging in these domains where usually only binary code is available; existing source code-based approaches to attribution have left unclear whether and to what extent pr...

متن کامل

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. Previous work has examined attribution of authors from both source code and compiled binaries, and found that while source code can be attributed with very high accuracy, the attribution of executable binary appears to be much more difficult. Many pote...

متن کامل

Forty Years of X-Ray Binaries

In 2012 it was forty years ago that the discovery of the first X-ray binary Centaurus X-3 became known. That same year it was discovered that apart from the High-Mass X-ray Binaries (HMXBs) there are also Low-Mass X-ray Binaries (LMXBs), and that Cygnus X-1 is most probably a black hole. By 1975 also the new class of Be/X-ray binaries was discovered. After this it took 28 years before ESAs INTE...

متن کامل

Identifying Multiple Authors in a Binary Program

Knowing the authors of a binary program has significant application to forensics of malicious software (malware), software supply chain risk management, and software plagiarism detection. Existing techniques assume that a binary is written by a single author, which does not hold true in real world because most modern software, including malware, often contains code from multiple authors. In thi...

متن کامل

Updating Viral Molecular Biology and Pathogenesis

s of poster presentations are listed in a separate section. Poster codes correspond to the numbers of the poster boards. Please refer to the Final Program for a detailed explanation of the coding system. The codes are also used as a reference in the Index of Authors. Code . . . . . . . . . . . . page Training Courses TC . . . . . . . . . . . . . . . 42-51 Plenary Session WACC PS WACC . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016