摘要
新出现的恶意代码大部分是在原有恶意代码基础上修改转换而来。许多变形恶意代码更能自动完成该过程,由于其特征码不固定,给传统的基于特征码检测手段带来了极大挑战。采用归一化方法,并结合使用传统检测技术是一种应对思路。本文针对指令乱序这种常用变形技术提出了相应的归一化方案。该方案先通过控制依赖分析将待测代码划分为若干基本控制块,然后依据数据依赖图调整各基本控制块中的指令顺序,使得不同变种经处理后趋向于一致的规范形式。该方案对指令乱序的两种实现手段,即跳转法和非跳转法,同时有效。最后通过模拟测试对该方案的有效性进行了验证。
Much of apparently new malware comes from transformed known malware. Metamorphic malware could even complete this process automatically. The mutable signature makes the traditional detection method based on it difficult to detect metamorphic malware. Combining normalization idea with the traditional detection technology is a promising approach to resolve the problem. This paper proposes a normalization scheme towards instructions reordering metamorphism technique. In the scheme, the inspected code is firstly partitioned into some basic control blocks based on control-dependency analysis, then the instructions order in each block is adjusted according to the data-dependency graph. After the variants of malware are normalized according to the scheme, they tend to have the same form. The scheme is applicable to both jump method and non-jump method which are two implementations of instructions reordering. Testing has been conducted to validate the feasibility of the scheme.
出处
《计算机科学》
CSCD
北大核心
2008年第2期89-92,共4页
Computer Science
关键词
变形恶意代码
归一化
恶意代码检测
Metamorphic malware, Normalization, Malware detection