Unpacking virtualization obfuscators

  • Authors:
  • Rolf Rolles

  • Affiliations:
  • -

  • Venue:
  • WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nearly every malware sample is sheathed in an executable protection which must be removed before static analyses can proceed. Existing research has studied automatically unpacking certain protections, but has not yet caught up with many modern techniques. Contrary to prior assumptions, protected programs do not always have the property that they are reverted to a fully unprotected state at some point during the course of their execution. This work provides a novel technique for circumventing one of the most problematic features of modern software protections, so-called virtualization obfuscation. The technique enables analysis of heretofore impenetrable malware.