Unpacking Techniques and Tools in Malware Analysis

Pei Dai Xie,Mei Jian Li,Yong Jun Wang,Jin Shu Su,Xi Cheng Lu
DOI: https://doi.org/10.4028/www.scientific.net/amm.198-199.343
2012-01-01
Applied Mechanics and Materials
Abstract:Nowadays most of malware samples are packed with runtime packers to complicate the task of reverse engineering and security analysis in order to evade detection of signature-based anti-virus engines. In the overall process of malware analysis, unpacking a packed malicious binary effectively is a necessary preliminary to extract the structure features from the binary for generation of its signature, and therefore several unpacking techniques have been proposed so far that attempt to deal with the packer problem. This brief survey article provides an overview of the currently published prevalent unpacking techniques and tools. It covers the operation process of packing and unpacking, packer detection methods, heuristic policies for spotting original entry point (OEP), environments for runtime unpacking, anti-unpacking techniques, and introduces several typical tools for unpacking.
What problem does this paper attempt to address?