NUST Institutional Repository

Software Analysis and De-obfuscation Engine

Show simple item record

dc.contributor.author Khalid, Faiza
dc.contributor.author Babar, Komal
dc.contributor.author Rehman, Nauvera
dc.contributor.author Wahab, Abdul
dc.contributor.author supervised by Lec. Aisha Khalid & Dr. Fauzan Mirza
dc.date.accessioned 2020-11-10T05:48:22Z
dc.date.available 2020-11-10T05:48:22Z
dc.date.issued 2009-08
dc.identifier.other PCS-176
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/11134
dc.description.abstract SADE (Software Analysis and De-obfuscation Engine) is a software analysis toolkit that generically (without finding out the specifics of the compression and encryption scheme used) detects and unpacks a packed (encrypted and compressed) windows executable file (PE32 file) and makes the unpacked code available for analysis. SADE also shows additional information about the executable file (resources, imports, sections etc). The motivation behind the project is that the problem to generically unpack malicious executables has been solved to some extent commercially but the competitive nature of the anti-virus software industry refrain them from publishing a solution. There is hence a lack of publicly available generic unpacking tools that can handle a wide range and variety of packed executable files without knowing the exact packer used to pack it. Furthermore, the growing epidemic of malware has strengthened the need to have more freely available tools to help in analyzing packed executable files. The chief users of the application are security analysts and main area of application is malware analysis. Malware authors use packing techniques to hide their malicious code and security analysts need to uncover the hidden executable code for creating signatures and understanding attacks. en_US
dc.description.abstract SADE (Software Analysis and De-obfuscation Engine) is a software analysis toolkit that generically (without finding out the specifics of the compression and encryption scheme used) detects and unpacks a packed (encrypted and compressed) windows executable file (PE32 file) and makes the unpacked code available for analysis. SADE also shows additional information about the executable file (resources, imports, sections etc). The motivation behind the project is that the problem to generically unpack malicious executables has been solved to some extent commercially but the competitive nature of the anti-virus software industry refrain them from publishing a solution. There is hence a lack of publicly available generic unpacking tools that can handle a wide range and variety of packed executable files without knowing the exact packer used to pack it. Furthermore, the growing epidemic of malware has strengthened the need to have more freely available tools to help in analyzing packed executable files. The chief users of the application are security analysts and main area of application is malware analysis. Malware authors use packing techniques to hide their malicious code and security analysts need to uncover the hidden executable code for creating signatures and understanding attacks. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Software Analysis and De-obfuscation Engine en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account