SEMA

System call analysis tool

Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior

SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.

GitHub

94 stars
3 watching
17 forks
Language: Python
last commit: 3 months ago
angrbinary-analysisclassificationconcolic-executionctfcybersecuritydetectionlinuxmalwaremalware-analysismalware-detectionmalware-researchpythonreversereverse-engineeringsemastatic-analysissymbolicsymbolic-executionwindows

Related projects:

Repository Description Stars
malwarecantfly/vba2graph Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords 274
kevoreilly/capev2 A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. 2,011
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
secrary/makin An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. 732
mandiant/capa An executable file analysis tool that identifies capabilities and potential malicious behaviors. 4,885
christhecoolhut/firmware_slap Analyzes firmware vulnerabilities using concolic analysis and function clustering 470
herosi/cto An IDA plugin for creating and analyzing function call graphs of malware 324
jpcertcc/aa-tools A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data 455
quarkslab/irma An asynchronous analysis system for suspicious files 269
cyb3rmx/qu1cksc0pe A comprehensive tool for analyzing suspicious files and detecting malware characteristics. 1,320
zhengmin1989/droidanalytics An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. 29
sekoialab/fastir_collector_linux A tool for gathering and recording information from live Linux systems for forensic analysis 173
adametry/gulp-eslint Identifies and reports on patterns in ECMAScript/JavaScript code 562
3coresec/automata Automated tool to detect errors in security monitoring and measure effectiveness of SIEM rules against various behaviors. 51
certego/pcapmonkey An analysis tool for packet capture files using Suricata and Zeek 144