期刊文献+

一类基于循环群理论的变形机理分析 被引量:1

Analysis to a class of polymorphic mechanism based on theory of cyclic group
下载PDF
导出
摘要 随着病毒与反病毒竞争的加剧,变形已成为病毒技术中必不可少的一部分,深入剖析病毒变形机理是查杀变形病毒的关键.通过运用循环群的基本理论对两个具体问题进行抽象分析,揭示了这类变形机理的理论依据,并讨论了相应的检测方法. While the competition between virus and anti-virus becomes acute, the polymorphism has been a necessary part of the technology in virus and the anatomy in-depth to polymorphic mechanism is the key to dealing with virus. By applying the basic theory of cyclic group, two questions are analyzed concretely, and their academic gist is shown. Furthermore, some detection policies are discussed in the end.
出处 《海军工程大学学报》 CAS 2004年第5期5-9,共5页 Journal of Naval University of Engineering
基金 国家自然科学基金资助项目(60373023)
关键词 循环群 加模循环群 乘模循环群 随机解密地址选取 代码重组 cyclic group addition-module cyclic group multiplication-module cyclic group selection for random decryption addresses permutation of code
  • 相关文献

参考文献3

  • 1祝恩 殷建平.计算机病毒的本质特性分析及检测[J].计算机科学,2001,28:238-238.
  • 2祝恩,殷建平,蔡志平,赵建民.计算机病毒自动变形机理的分析[J].计算机工程与科学,2002,24(6):14-17. 被引量:17
  • 3[3]Cohen F. Computer virus-theory and experiments [J]. Computer and Security,1987,6(1) :22-35.

二级参考文献5

  • 1祝恩,殷建平.计算机中的安全问题分析[J].计算机科学,2000,27(增刊):109-111.
  • 2[4]Charles P Pfleeger. Security in Computing[M].Prentice Hall PTR,1997.
  • 3[5]Fred Cohen. Computer Virus:Theory and Experiments[J]. Computer & Security,1987,6(11):22-35.
  • 4祝恩 殷建平.计算机病毒的本质特性分析及检测[J].计算机科学,2001,28:238-238.
  • 5蔡志平,殷建平,祝恩,许江.一种防范Win9X下文件型病毒的方案[J].计算机工程与科学,2001,23(4):90-92. 被引量:4

共引文献21

同被引文献9

  • 1Lucy Sherriff. Encryption vs antivirus [EB/OL]http://www.theregister.co. uk/2001/02/07/encryption_ vs_antivirus, 2001-02-07
  • 2Vesselin Vladimirov Bontchev. Future Trends in Virus Writing[C]. Proc 1st AVAR Conf, 2000
  • 3Tarkan Yetiser. Polymorphic Virus:Implementation, Detection and Protection [A]. VDS Advenced Re search Group, 1993,1
  • 4Carey Nachtenberg, Understanding and Managing Polymorphic Virus [EB/OL]. The Symantec Enterprise Paper, 1999,9
  • 5Ellen Messmer. Experts predict more mutating virus [EB/OL]. CNN. com Technology. 2000-10. http:// www. cnn. com/2000/TECH/computing/10/31/virus.havock. idg/index.html
  • 6Hume.病毒和网络攻击中的多态、变形技术原理分析及对策.X’CON,2003,(12).
  • 7W. Wong. Analysis and detection of metamorphic computer viruses [D]. Masters Thesis, Department of Computer Science, San Jose State University, 2006
  • 8Miodrag Zivkovi. A Table of Primitive Binary Polynomicals [J]. Mathematics of Computation. 1994, 62 (205) : 385-386
  • 9Shift Registers and Counters [EB/OL]. CS150 Lab 5. Spring, 1997

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部