Главная
Study mode:
on
1
Intro
2
Background
3
X-Force v.. PMP
4
Architecture of PMP
5
Memory Pre-planning
6
PAMA Preparation
7
Variable Initialization
8
SCMB and SDMB Properties
9
Example
10
Implementation
11
Probability Analysis
12
Probabilities of Errors in a Typical Setting
13
Evaluation Settings
14
Evaluation on SPEC 2000
15
Case Study: C&C Bot Malware Sample
16
Availability
Description:
Explore a novel approach to malware analysis through a conference talk on cost-effective forced execution using Probabilistic Memory Pre-planning (PMP). Delve into the challenges of exposing hidden malware behavior and learn how PMP overcomes limitations of existing techniques like X-Force. Discover the innovative memory pre-planning phase that pre-allocates and initializes a large buffer with carefully crafted random values. Understand how this method significantly improves execution speed, reduces false positives and negatives in program dependence detection, and exposes more malicious behaviors in recent malware samples. Examine the architecture, implementation, and probability analysis of PMP, along with its evaluation on SPEC 2000 and a case study on a C&C Bot malware sample.

PMP - Cost-Effective Forced Execution with Probabilistic Memory Pre-planning

IEEE
Add to list
0:00 / 0:00