{"title":"Pinky:一个现代的面向恶意软件的动态信息检索工具","authors":"Paul Irofti","doi":"arxiv-2311.03588","DOIUrl":null,"url":null,"abstract":"We present here a reverse engineering tool that can be used for information\nretrieval and anti-malware techniques. Our main contribution is the design and\nimplementation of an instrumentation framework aimed at providing insight on\nthe emulation process. Sample emulation is achieved via translation of the\nbinary code to an intermediate representation followed by compilation and\nexecution. The design makes this a versatile tool that can be used for multiple\ntask such as information retrieval, reverse engineering, debugging, and\nintegration with anti-malware products.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"19 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Pinky: A Modern Malware-oriented Dynamic Information Retrieval Tool\",\"authors\":\"Paul Irofti\",\"doi\":\"arxiv-2311.03588\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present here a reverse engineering tool that can be used for information\\nretrieval and anti-malware techniques. Our main contribution is the design and\\nimplementation of an instrumentation framework aimed at providing insight on\\nthe emulation process. Sample emulation is achieved via translation of the\\nbinary code to an intermediate representation followed by compilation and\\nexecution. The design makes this a versatile tool that can be used for multiple\\ntask such as information retrieval, reverse engineering, debugging, and\\nintegration with anti-malware products.\",\"PeriodicalId\":501333,\"journal\":{\"name\":\"arXiv - CS - Operating Systems\",\"volume\":\"19 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Operating Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2311.03588\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Operating Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2311.03588","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Pinky: A Modern Malware-oriented Dynamic Information Retrieval Tool
We present here a reverse engineering tool that can be used for information
retrieval and anti-malware techniques. Our main contribution is the design and
implementation of an instrumentation framework aimed at providing insight on
the emulation process. Sample emulation is achieved via translation of the
binary code to an intermediate representation followed by compilation and
execution. The design makes this a versatile tool that can be used for multiple
task such as information retrieval, reverse engineering, debugging, and
integration with anti-malware products.