Result Details

Extraction of Information from .NET Executable Files

MILKOVIČ, M. Extraction of Information from .NET Executable Files. Sborník příspěvků Mezinárodní Masarykovy konference pro doktorandy a mladé vědecké pracovníky 2017. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2017. p. 1-9. ISBN: 978-80-87952-22-1.
Type
conference paper
Language
English
Authors
Milkovič Marek, Ing., FIT (FIT), DIFS (FIT)
Abstract


The occurrence of malicious software written in .NET languages is rapidly increasing. Extracting the information out of .NET executable file is therefore necessary step in order to fight against this kind of malware. In this paper, we propose methods to extract information out of .NET executable files, which are safe and platform independent. These methods include data type reconstruction, but also extraction of unique features such as TypeLib identifier or Module Version identifier. We also point out mistakes that are being done in this field so far. After implementing the proposed methods, we compare it with already existing .NET disassemblers yielding very good results. Extracted information are planned to be used in creation of detection patterns, clustering and other areas at Avast Software.

Keywords

reverse engineering, executable files, .NET, type reconstruction, typelib

Published
2017
Pages
1–9
Proceedings
Sborník příspěvků Mezinárodní Masarykovy konference pro doktorandy a mladé vědecké pracovníky 2017
Conference
International Masaryk Conference For Ph.D. Students and Young Researchers
ISBN
978-80-87952-22-1
Publisher
Akademické sdružení MAGNANIMITAS Assn.
Place
Hradec Králové
BibTeX
@inproceedings{BUT144485,
  author="Marek {Milkovič}",
  title="Extraction of Information from .NET Executable Files",
  booktitle="Sborník příspěvků Mezinárodní Masarykovy konference pro doktorandy a mladé vědecké pracovníky 2017",
  year="2017",
  pages="1--9",
  publisher="Akademické sdružení MAGNANIMITAS Assn.",
  address="Hradec Králové",
  isbn="978-80-87952-22-1",
  url="https://www.fit.vut.cz/research/publication/11564/"
}
Files
Projects
Methods for extracting and detecting patterns in the program code, Avast, start: 2017-09-01, end: 2024-08-31, running
Research groups
Departments
Back to top