This is the code for paper: Deep Learning Assisted Reverse Engineering: Recognizing Encryption Loops in Ransomware (IEEE TrustCom 2025)
First, we conduct the experiment on a 32-bit linux system. You can use Vagrant to conduct your virtual machine, and we have a Vagrantfile for you.
First, start virtual machine
vagrant upsecond, log in your virtual machine
vagrant sshyou also have to download a intel pin (3.10) and intel xed via install_xed.sh.
We have compiled the trace.so for tracing ransomware and grpahbuilder for DDG generation. For example:
./pin/pin -t trace.so -o 3des_ecb.tr -- 3des_ecb
./graph_builder 3des_ecb.tr 3des_ecb.graphWe have collect some reports while we are tracing the ransomware to give examples in ransom-example and provide a doc to describe our results. We cannot share the raw ransomware samples because of the safety considerations.
We provide the training dataset in directory sample. And it has the description of the dataset.