期刊文献+

采用条件跳转混淆技术的恶意代码反汇编 被引量:5

Disassembly of Malicious Code with Conditional Jump Obfuscation Technique
下载PDF
导出
摘要 恶意代码已经构成了计算机安全的主要威胁,为了避免被静态分析,恶意代码采用了各种混淆技术来自我隐藏,条件跳转混淆技术就是其中之一。该文通过研究条件跳转混淆的成因,对已有的典型反汇编算法进行了改进,其实现已被逆向分析工具Radux采用,测试验证了该方法能够有效地对采用条件跳转混淆技术的恶意代码进行正确的反汇编。 Malicious codes have become a main threat to computer security.They take various obfuscation techniques to hide themselves in order not to be statically analyzed.Conditional jump obfuscation is one of such techniques.This paper analyzes the reason lead to the conditional jump obfuscation and modifies the disassembly algorithm in the reverse analysis tool named Radux.Relevant test shows that the method is effective to get the correct disassembly result from the malicious codes obfuscated with conditional jumps.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第8期153-155,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z408)
关键词 条件跳转 混淆 恶意代码 反汇编 conditional jump obfuscation malicious codes disassembly
  • 相关文献

参考文献4

  • 1McGraw G, Morisett G. Attacking Malicious Code: A Report to the Infosec Research Council[J]. IEEE Software, 2000, 17(5): 33-41.
  • 2Lakhotia A, Singh P K. Challenges in Getting Formal with Viruses[EB/OL]. (2003-09-01). http://www.virusbtn. com/magazine/ archives/200309/
  • 3Linn C, Debray S. Obfuscation of Executable Code to Improve Resistance to Static Disassembly[C]//Proc. of the 10th ACM Conference on Computer and Communications Security. Washington, D. C., USA: [s. n.], 2003: 290-299.
  • 4Kruegel C, Robertson W, Valeur F, et al. Static Disassembly of Obfuscated Binaries[C]//Proceedings of the 13th Conference on USENIX Security Symposium. San Diego, CA, USA: [s. n.], 2004.

同被引文献42

  • 1李项军,夏靖波,罗赟骞.基于SVG的图形化网络拓扑显示模块设计[J].空军工程大学学报(自然科学版),2007,8(2):89-91. 被引量:2
  • 2许敏,陈前斌.静态反汇编算法研究[J].计算机与数字工程,2007,35(5):13-16. 被引量:7
  • 3侯晓静,苑津莎,李中,祁立刚.基于SVG的网络图形制作方法研究[J].电力系统通信,2007,28(6):43-46. 被引量:3
  • 4Levin,R B.The computer virus handbook[C].Osbome McGraw- Hill,2003.
  • 5W3C.Scalable vector graphics (SVG)I.0 specification[R].Working Draft,2000.
  • 6Skoudis E,Zehser L.Malware:Fighting Malicious Code[M].[S.l.]:Prentice Hall,2003.
  • 7Kruegel C,Robertson W,Valeur F,et al.Static Disassembly of Obfuscatod Binaries[D].Santa Barbara,CA,USA:Reliable Software Group,Computer Science Department,University of California,2004.
  • 8Christodorescu M,Jha S.Static Analysis of Executables to Detect Malicious Patterns[C]//Proceedings of the 12th USENIX Security Symposium.BerKeley,CA,USA:[s.n.],2003.
  • 9AaronEWalsh.XHTML实例精解[M].北京:清华大学出版社,2002..
  • 10信息系统安全等级保护基本要求,GB/T22239-2008[S].北京:中国标准出版社,2008.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部