Posts: 15,348
	Threads: 9,926
		Thanks Received: 9,189 in 7,341 posts
Thanks Given: 10,041
	Joined: 12 September 18
	
	
 
	
		
		
 22 February 19, 11:13
 
		22 February 19, 11:13 
		
	 
	
		Quote:![[Image: logo-big.png]](https://www.virusbulletin.com/files/4614/4535/7515/logo-big.png)
Static analysis of malware is usually "done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures," writes Thaís Moreira Hamasaki in her VB2018 paper.
To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser known technique that is becoming increasingly popular among malware analysts is constraint programming, which gives insight into the conditions necessary for the execution to take specific branches.
![[Image: 2c5b2567a6332ca4c870b1710708bbdd_f3129.jpg]](https://www.virusbulletin.com/files/cache/2c5b2567a6332ca4c870b1710708bbdd_f3129.jpg) 
In her detailed VB2018 paper, Thaís (who was then at 
F-Secure) presented an overview of constraint programming and explained how it can be applied to the analysis of (potentially) malicious binaries. Today we have published Thaís' paper in both 
HTML and 
PDF format. We have also uploaded the video of her presentation to our 
YouTube channel.
Analysing compiled binaries using logic
Read the paper (HTML)
Download the paper (PDF)