期刊文献+

恶意代码模糊变换技术研究 被引量:3

Research on Obfuscating Transformation Technology for Malicious Code
下载PDF
导出
摘要 在分析恶意代码模糊变换技术的基础上,给出了恶意代码模糊变换的形式化描述,提出了模糊变换引擎的框架结构,实现了恶意代码模糊变换引擎原型。试验结果表明模糊变换技术可以有效地提高恶意代码的生存能力。 Based on the analysis of the obfuscating transformation technology used by malicious code, this paper formally specifies the obfuscating transformation, presents a framework of obfuscating transformation engine, and develops a prototype. The experiment results show that obfuscating transformation can be used to improve the survivability of the malicious code.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第12期154-156,共3页 Computer Engineering
关键词 恶意代码 特征码扫描 模糊变换 变形 Malicious code Signature scanning Obfuscating transformation Metamorphism
  • 相关文献

参考文献4

  • 1Grimes R A.Malicious Mobile Code,Virus Protection for Windows[M].O'Reilly & Associates,2001:2-3.
  • 2Collberg C S,Thomborson C.Watermarking,Tamper-proofing and Obfuscation Tools for Software Protection[J].IEEE Transactions on Software Engineering,2002,28(8):735-746.
  • 3Cohen F.Computer Viruses[D].USA:University of Southern California,1985.
  • 4Wroblewski G.A General Method of Program Code Obfuscation[D].Wroclaw University,2002.

同被引文献13

  • 1陈峰,罗养霞,陈晓江,龚晓庆,房鼎益.网络攻击技术研究进展[J].西北大学学报(自然科学版),2007,37(2):208-212. 被引量:15
  • 2Christodorescu M, Jha S, Kruegel C. Mining specifi- cations of malicious behavior. Proc. of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), September 2007,5 - 14.
  • 3Bayer U, Moser A, Kruegel C, Kirda E. Dynamic analysis of malicious code. Computer Virology, 2006, 2:67 - 77.
  • 4Bellard F. Qemu, a Fast and Portable Dynamic Translator. Prec. of Usenix Annual Technical Conference, 2005.
  • 5Ting RMH, Bailey J. Mining minimal contrast subgraph patterns. Proc. of the 6th SIAM International Conference on Data Mining, 2006, 639 - 643.
  • 6Costa M, Crowcroff J, Castro M, Rowstron A, Zhou L, Zhang L, Barham P. Vigilante: End-to-End Contain- ment of Intemet Worms. Proc. of 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
  • 7向永谦,阳凌怡.网络入侵容忍技术研究[J].信息网络安全,2010(9):64-66. 被引量:2
  • 8宋言伟,马钦德,张健.信息安全等级保护政策和标准体系综述[J].信息通信技术,2010,4(6):58-63. 被引量:12
  • 9王蕊,冯登国,杨轶,苏璞睿.基于语义的恶意代码行为特征提取及检测方法[J].软件学报,2012,23(2):378-393. 被引量:74
  • 10吴丹飞,王春刚,郝兴伟.恶意代码的变形技术研究[J].计算机应用与软件,2012,29(3):74-77. 被引量:7

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部