JOURNAL ARTICLE

Automatic Reverse Engineering of Malware Emulators

Abstract

Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated instruction set and paired with a native binary emulator that interprets the bytecode. No existing malware analysis can reliably reverse this obfuscation technique. In this paper, we present the first work in automatic reverse engineering of malware emulators. Our algorithms are based on dynamic analysis. We execute the emulated malware in a protected environment and record the entire x86 instruction trace generated by the emulator. We then use dynamic data-flow and taint analysis over the trace to identify data buffers containing the bytecode program and extract the syntactic and semantic information about the bytecode instruction set. With these analysis outputs, we are able to generate data structures, such as control-flow graphs, that provide the foundation for subsequent malware analysis. We implemented a proof-of-concept system called Rotalume and evaluated it using both legitimate programs and malware emulated by VMProtect and code virtualizer. The results show that Rotalume accurately reveals the syntax and semantics of emulated instruction sets and reconstructs execution paths of original programs from their bytecode representations.

Keywords:
Bytecode Computer science Malware Reverse engineering Emulation Cryptovirology Programming language Static analysis x86 Obfuscation Malware analysis TRACE (psycholinguistics) Program analysis Control flow Semantics (computer science) Syntax Operating system Artificial intelligence Computer security Virtual machine Software

Metrics

199
Cited By
15.65
FWCI (Field Weighted Citation Impact)
39
Refs
1.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Software Testing and Debugging Techniques
Physical Sciences →  Computer Science →  Software

Related Documents

BOOK-CHAPTER

Reverse Engineering of Malware Emulators

Michalis Polychronakis

Year: 2011 Pages: 1043-1044
BOOK-CHAPTER

Reverse Engineering of Malware Emulators

Michalis Polychronakis

Year: 2025 Pages: 2106-2107
BOOK-CHAPTER

Reverse-Engineering Malware

Marwan OmarLuís Borges GouveiaJamal N. Al‐KarakiDerek Mohammed

Advances in information security, privacy, and ethics book series Year: 2022 Pages: 194-217
JOURNAL ARTICLE

Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div

Raditya Faisal Waliulu

Journal:   Journal of Informatics Information System Software Engineering and Applications (INISTA) Year: 2018 Vol: 1 (1)
© 2026 ScienceGate Book Chapters — All rights reserved.