{"title":"An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software","authors":"G. Wagener, A. Dulaunoy, T. Engel","doi":"10.1109/SITIS.2008.57","DOIUrl":null,"url":null,"abstract":"Reverse engineering is often the last resort for analyzing unknown or closed source software. Such an investigation is motivated by a risk evaluation of closed source programs or by evaluating consequences and countermeasures against infections by malicious programs that are often closed source. This article presents a success story where we used and modified free software serving as environment for analyzing unknown software. We explain how a malware sandbox can be constructed based on free software. Moreover we describe how we modified free software to improve malware analysis with additional features or extensions. Free software helped us to increase the accuracy of malware or unknown software analysis.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SITIS.2008.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Reverse engineering is often the last resort for analyzing unknown or closed source software. Such an investigation is motivated by a risk evaluation of closed source programs or by evaluating consequences and countermeasures against infections by malicious programs that are often closed source. This article presents a success story where we used and modified free software serving as environment for analyzing unknown software. We explain how a malware sandbox can be constructed based on free software. Moreover we describe how we modified free software to improve malware analysis with additional features or extensions. Free software helped us to increase the accuracy of malware or unknown software analysis.