Deobfuscate Non-Returning Calls and Call-Stack Tampering in Instruction Traces

Jing Qiu,Xiao Hong Su,Pei Jun Ma
DOI: https://doi.org/10.4028/www.scientific.net/amr.989-994.1782
2014-01-01
Advanced Materials Research
Abstract:Instruction traces are essential for dynamic analysis in reverse engineering. Code in instruction traces is often obfuscated to hinder analysts from understanding and analyzing in malware and binaries that protected by packers. Non-returning calls and call-stack tampering are two typical kinds of such obfuscation. We propose a deobfuscation approach to fight against these two kinds of obfuscated code. We first apply static analysis on instruction traces to identify obfuscated code. Then we transform obfuscated code into semantically equivalent instructions to make the code be easy to understand. Evaluations results on some packed binaries indicate that our approach works well in deobfuscate instruction traces with non-returning calls and call-stack tampering in high precision.
What problem does this paper attempt to address?