摘要
函数调用相关信息识别是二进制代码静态分析的基础,也是恶意代码分析的重要线索。二进制代码混淆技术通过对函数调用指令call、参数传递过程和调用返回过程的混淆来隐藏代码中函数的信息。这大大增加了程序逆向分析的难度,此技术被广泛应用在变形和多态病毒中,使其逃脱杀毒软件的查杀。论文给出了一种静态分析方法,引入了抽象栈图的概念,给出了其构造算法,利用它能够有效识别出代码中对函数调用的混淆。
Identification of information about functions forms the base of static binary analysis and malicious code detection.A heuristic approach to detect metamorphic virus is to examine the calls a binary makes to the operating system.To avoid this,malicious code programmers hide the information about functions using a variety of obfuscations,including substitution of call with another equivalent instruction sequences,changing the normal form of parameters passing and returning process.These obfuscation methods introduce much difficulty for reverse code analysis.To deal with the problem,this article presents a static method which can detect obfuscated function calls in a binary efficiently.
出处
《计算机工程与应用》
CSCD
北大核心
2007年第17期24-28,共5页
Computer Engineering and Applications
基金
国家高技术研究发展计划(863) (the National High- Tech Research and Development Plan of China under Grant No.2003AA146010)
关键词
代码混淆
恶意软件
静态分析
变形病毒
code obfuscation
malicious code
static analysis
metamorphic viruse