A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Control Flow Graph Based Virus Scanning 0 Douglas Goddard Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Control Flow Graph Based Virus Scanning
Douglas Goddard
Derbycon 2014

Traditional anti,virus works by detecting sequences of bytes. Many evasion techniques manipulate data and code in very minor ways that, while not affecting the functionality of the program, change the sequences of bytes within it. An alternative approach is to identify programs based on their control flow graphs (CFGs). Using the Baksmali tool as a base, I’ve added code to parse the CFG for each method, read in a signature file, and run different comparison algorithms to effectively make a CFG based virus scanner. An algorithm for node,by,node matching has been designed and implemented specifically for this project. The algorithms, efficacy, and implementation of this tool will be discussed.Some technical background will be helpful. However, in addition to the control flow graph isomorphism algorithm, this talk will attempt to cover the necessary background knowledge including traditional anti,virus methods, Android APK structure and code, disassembly, basic blocks, and control flow graphs.

Back to Derbycon 2014 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast