Obfuscation Resilient Search Through Executable Classification
Title | Obfuscation Resilient Search Through Executable Classification |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Su, Fang-Hsiang, Bell, Jonathan, Kaiser, Gail, Ray, Baishakhi |
Conference Name | Proceedings of the 2Nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages |
Publisher | ACM |
ISBN Number | 978-1-4503-5834-7 |
Keywords | bytecode analysis, bytecode search, Computing Theory and Resilience, control theory, Deep Learning, executable search, graph theory, Human Behavior, malware analysis, Metrics, obfuscation resilience, privacy, pubcrawl, Resiliency |
Abstract | Android applications are usually obfuscated before release, making it difficult to analyze them for malware presence or intellectual property violations. Obfuscators might hide the true intent of code by renaming variables and/or modifying program structures. It is challenging to search for executables relevant to an obfuscated application for developers to analyze efficiently. Prior approaches toward obfuscation resilient search have relied on certain structural parts of apps remaining as landmarks, un-touched by obfuscation. For instance, some prior approaches have assumed that the structural relationships between identifiers are not broken by obfuscators; others have assumed that control flow graphs maintain their structures. Both approaches can be easily defeated by a motivated obfuscator. We present a new approach, MACNETO, to search for programs relevant to obfuscated executables leveraging deep learning and principal components on instructions. MACNETO makes few assumptions about the kinds of modifications that an obfuscator might perform. We show that it has high search precision for executables obfuscated by a state-of-the-art obfuscator that changes control flow. Further, we also demonstrate the potential of MACNETO to help developers understand executables, where MACNETO infers keywords (which are from relevant un-obfuscated programs) for obfuscated executables. |
URL | https://dl.acm.org/citation.cfm?doid=3211346.3211352 |
DOI | 10.1145/3211346.3211352 |
Citation Key | su_obfuscation_2018 |