TY - GEN
T1 - Detecting traditional packers, decisively
AU - Bueno, Denis
AU - Compton, Kevin J.
AU - Sakallah, Karem A.
AU - Bailey, Michael
PY - 2013
Y1 - 2013
N2 - Many of the important decidability results in malware analysis are based Turing machine models of computation. We exhibit computational models which use more realistic assumptions about machine and attacker resources. While seminal results such as [1-5] remain true for Turing machines, we show under more realistic assumptions, important tasks are decidable instead of undecidable. Specifically, we show that detecting traditional malware unpacking behavior - in which a payload is decompressed or decrypted and subsequently executed - is decidable under our assumptions. We then examine the issue of dealing with complex but decidable problems. We look for lessons from the hardware verification community, which has been striving to meet the challenge of intractable problems for the past three decades.
AB - Many of the important decidability results in malware analysis are based Turing machine models of computation. We exhibit computational models which use more realistic assumptions about machine and attacker resources. While seminal results such as [1-5] remain true for Turing machines, we show under more realistic assumptions, important tasks are decidable instead of undecidable. Specifically, we show that detecting traditional malware unpacking behavior - in which a payload is decompressed or decrypted and subsequently executed - is decidable under our assumptions. We then examine the issue of dealing with complex but decidable problems. We look for lessons from the hardware verification community, which has been striving to meet the challenge of intractable problems for the past three decades.
UR - http://www.scopus.com/inward/record.url?scp=84888323889&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84888323889&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-41284-4_10
DO - 10.1007/978-3-642-41284-4_10
M3 - Conference contribution
AN - SCOPUS:84888323889
SN - 9783642412837
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 184
EP - 203
BT - Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Proceedings
T2 - 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013
Y2 - 23 October 2013 through 25 October 2013
ER -