Identification of Exception Return in Subroutine of Executable File

ZHANG Yi-chi,PANG Jian-min,ZHAO Rong-cai,HAN Xiao-su
2009-01-01
Abstract:Malware writers make use of exception return of subroutine to evade detecting by malware detectors.To crack the technique,this paper proposes a novel disassembly algorithm.This algorithm decodes an executable file twice and emulates the operations on memory stack.Through this twice-decoding and emulation process,this algorithm can be used to recognize exception returns and thus ensure the correctness of a decoding process.Compared with two commonly used disassemblers IDAPro and OBJDump,this algorithm is better at identifying this kind of exception and improves the rate of disassembly.
What problem does this paper attempt to address?