The Reversing Machine: Reconstructing Memory Assumptions

Mohammad Sina Karvandi,Soroush Meghdadizanjani,Sima Arasteh,Saleh Khalaj Monfared,Mohammad K. Fallah,Saeid Gorgin,Jeong-A Lee,Erik van der Kouwe
2024-05-01
Abstract:Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can bypass OS-level anti-virus mechanisms easily. Although static analysis of such malware is possible, obfuscation and packing techniques complicate offline analysis. Moreover, current dynamic analyzers suffer from virtualization performance overhead and create detectable traces that allow modern malware to evade them.
Cryptography and Security
What problem does this paper attempt to address?