Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping

Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping

IEEE Symposium on Security and Privacy via YouTube Direct link

Summary

14 of 14

14 of 14

Summary

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Cryptographic Function • Encryption and decryption procedure
  3. 3 Crypto Functions in Malware
  4. 4 Why Detect Crypto Functions? • Provide a starting point for reverse engineering
  5. 5 Crypto Function Attributes
  6. 6 Existing Detection Methods
  7. 7 Challenges
  8. 8 Our Method
  9. 9 Overview * Equivalence check on loop bodies in the
  10. 10 Loop Detection
  11. 11 Bit Symbolic Execution
  12. 12 Equivalence Checking • Replace the mapped input variables with new
  13. 13 Evaluation
  14. 14 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.