Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/adrianherrera/malware-s2e

Code for my blog post on using S2E for malware analysis
https://github.com/adrianherrera/malware-s2e

malware s2e symbolic-execution

Last synced: 3 months ago
JSON representation

Code for my blog post on using S2E for malware analysis

Awesome Lists containing this project

README

        

# Analysing "Trigger-based" Malware with S2E

This code accompanies my Analysing "Trigger-based" Malware [blog
post](https://adrianherrera.github.io/post/malware-s2e) and
[slides](https://speakerdeck.com/adrianherrera/analyzing-trigger-based-malware-with-s2e).

Both directories should be copied into the windows directory of the
[guest-tools](https://github.com/S2E/guest-tools) repo in your S2E environment,
located at `$S2EDIR/source/s2e/guest/windows`.

Open the `s2e.sln` solution in Visual Studio and add the `malware-inject`,
`GetLocalTime-hook` and `wannacry-hook` projects to the s2e solution.

The `GetLocalTime-test` project can be used to test symbolic execution of
`GetLocalTime`. `GetLocalTime-test` is a stand-alone project and does **not**
have to be added to the s2e solution.