A Reverse Engineering Tool that Directly Injects Shellcodes to the Code Caves in Portable Executable Files

K. Açıcı, Güney Uğurlu
{"title":"A Reverse Engineering Tool that Directly Injects Shellcodes to the Code Caves in Portable Executable Files","authors":"K. Açıcı, Güney Uğurlu","doi":"10.1109/ICTACSE50438.2022.10009732","DOIUrl":null,"url":null,"abstract":"Code caves are used in cybersecurity and reverse engineering and describe the space in a PE file that consists of sequential and random unused or empty bytes. Malware writers and hackers design malwares to inject shellcode into these code caves and can create backdoors on computers through to the shellcodes they inject. Apart from malicious use, the benefits of injecting code into code caves should also be considered. When software developers develop new software, they can use code caves and code injection to make minor changes to the compiled software. With the reverse engineering tool we developed named CodeCaveInjection, we demonstrated how to inject shell codes with 2 different methods and made this process easier.","PeriodicalId":301767,"journal":{"name":"2022 International Conference on Theoretical and Applied Computer Science and Engineering (ICTASCE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Theoretical and Applied Computer Science and Engineering (ICTASCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTACSE50438.2022.10009732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Code caves are used in cybersecurity and reverse engineering and describe the space in a PE file that consists of sequential and random unused or empty bytes. Malware writers and hackers design malwares to inject shellcode into these code caves and can create backdoors on computers through to the shellcodes they inject. Apart from malicious use, the benefits of injecting code into code caves should also be considered. When software developers develop new software, they can use code caves and code injection to make minor changes to the compiled software. With the reverse engineering tool we developed named CodeCaveInjection, we demonstrated how to inject shell codes with 2 different methods and made this process easier.
直接将shell代码注入可移植可执行文件中的代码洞的逆向工程工具
代码洞用于网络安全和逆向工程,描述PE文件中由顺序和随机未使用或空字节组成的空间。恶意软件编写者和黑客设计恶意软件将shellcode注入这些代码洞,并可以通过他们注入的shellcode在计算机上创建后门。除了恶意使用之外,还应该考虑将代码注入代码洞的好处。当软件开发人员开发新软件时,他们可以使用代码洞和代码注入对编译后的软件进行微小的更改。使用我们开发的反向工程工具CodeCaveInjection,我们演示了如何用两种不同的方法注入shell代码,并使这个过程更容易。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信