SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code

被引:47
作者
Alrabaee, Saed [1 ]
Shirani, Paria [1 ]
Wang, Lingyu [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Comp Secur Lab, Montreal, PQ, Canada
关键词
Function identification; Reverse engineering; Binary program analysis; Malware forensics; Digital forensics; SIMILARITY;
D O I
10.1016/j.diin.2015.01.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The capability of efficiently recognizing reused functions for binary code is critical to many digital forensics tasks, especially considering the fact that many modern malware typically contain a significant amount of functions borrowed from open source software packages. Such a capability will not only improve the efficiency of reverse engineering, but also reduce the odds of common libraries leading to false correlations between unrelated code bases. In this paper, we propose SIGMA, a technique for identifying reused functions in binary code by matching traces of a novel representation of binary code, namely, the Semantic Integrated Graph (SIG). The SIG s enhance and merge several existing concepts from classic program analysis, including control flow graph, register flow graph, and function call graph into a joint data structure. Such a comprehensive representation allows us to capture different semantic descriptors of common functionalities in a unified manner as graph traces, which can be extracted from binaries and matched to identify reused functions, actions, or open source software packages. Experimental results show that our approach yields promising results. Furthermore, we demonstrate the effectiveness of our approach through a case study using two malware known to share common functionalities, namely, Zeus and Citadel. (C) 2015 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:S61 / S71
页数:11
相关论文
共 19 条
[1]   OBA2: An Onion approach to Binary code Authorship Attribution [J].
Alrabaee, Saed ;
Saleem, Noman ;
Preda, Stere ;
Wang, Lingyu ;
Debbabi, Mourad .
DIGITAL INVESTIGATION, 2014, 11 :S94-S103
[2]  
[Anonymous], 2010, P 2010 ACM S APPL CO, DOI DOI 10.1145/1774088.1774505
[3]  
Balliu M, 2014, P 21 ACM C COMP COMM
[4]  
Bencsath Boldizsar., 2012, sKyWIper (aka Flame aka Flamer): A complex malware for targeted attacks
[5]  
Calvet Joan, 2012, ACM CCS, P169
[6]   Malwise-An Effective and Efficient Classification System for Packed and Polymorphic Malware [J].
Cesare, Silvio ;
Xiang, Yang ;
Zhou, Wanlei .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (06) :1193-1206
[7]  
David Y, 2014, ACM SIGPLAN NOTICES, V49, P349, DOI [10.1145/2666356.2594343, 10.1145/2594291.2594343]
[8]   Enhancing the detection of metamorphic malware using call graphs [J].
Elhadi, Ammar Ahmed E. ;
Maarof, Mohd Aizaini ;
Barry, Bazara I. A. ;
Hamza, Hentabli .
COMPUTERS & SECURITY, 2014, 46 :62-78
[9]  
Gröbert F, 2011, LECT NOTES COMPUT SC, V6961, P41, DOI 10.1007/978-3-642-23644-0_3
[10]  
Hu X, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P611