SEMA

System call analysis tool

Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior

SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.

GitHub

101 stars
3 watching
21 forks
Language: Python
last commit: 3 months ago
angrbinary-analysisclassificationconcolic-executionctfcybersecuritydetectionlinuxmalwaremalware-analysismalware-detectionmalware-researchpythonreversereverse-engineeringsemastatic-analysissymbolicsymbolic-executionwindows

Related projects:

Repository Description Stars
malwarecantfly/vba2graph Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords 275
kevoreilly/capev2 A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. 2,043
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
secrary/makin An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. 735
mandiant/capa An executable file analysis tool that identifies capabilities and potential malicious behaviors. 4,944
christhecoolhut/firmware_slap Analyzes firmware vulnerabilities using concolic analysis and function clustering 472
herosi/cto An IDA plugin for creating and analyzing function call graphs of malware 328
jpcertcc/aa-tools A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data 455
quarkslab/irma An asynchronous analysis system for suspicious files 268
cyb3rmx/qu1cksc0pe An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. 1,348
zhengmin1989/droidanalytics An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. 29
sekoialab/fastir_collector_linux A tool for gathering and recording information from live Linux systems for forensic analysis 173
adametry/gulp-eslint Identifies and reports on patterns in ECMAScript/JavaScript code 562
3coresec/automata Automated tool to detect errors in security monitoring and measure effectiveness of SIEM rules against various behaviors. 53
certego/pcapmonkey An analysis tool for packet capture files using Suricata and Zeek 145