{"title":"Function Grouping & Visualization Through Machine Learning to Aid and Automate Reverse Engineering of Malware","authors":"M. Cutshaw, Rita Foster, Jedediah Haile","doi":"10.1109/RWS55399.2022.9984035","DOIUrl":null,"url":null,"abstract":"Modern malware analysis is stymied by dependence on the manual components of reverse engineering, which require skilled reverse engineers to perform static analysis. Machine learning and statistical analysis allow for augmentation of static analysis, detection of common benign code in malicious samples, and grouping similar bodies of low-level code. In this work four malware campaigns along with a dataset of known benign executables were utilized to test a process for grouping nearly identical functions to find similarities across executables and identify common code. In addition, those groups were collated to create sets of shared common code which could be used to better understand malware sample variants.","PeriodicalId":170769,"journal":{"name":"2022 Resilience Week (RWS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Resilience Week (RWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RWS55399.2022.9984035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Modern malware analysis is stymied by dependence on the manual components of reverse engineering, which require skilled reverse engineers to perform static analysis. Machine learning and statistical analysis allow for augmentation of static analysis, detection of common benign code in malicious samples, and grouping similar bodies of low-level code. In this work four malware campaigns along with a dataset of known benign executables were utilized to test a process for grouping nearly identical functions to find similarities across executables and identify common code. In addition, those groups were collated to create sets of shared common code which could be used to better understand malware sample variants.