期刊文献+

恶意代码多态变形技术的研究 被引量:5

Research on Polymorphism Metamorphism Malicious Code Technology
下载PDF
导出
摘要 恶意代码的深层隐藏和检测技术已经成为当前计算机安全技术的一个研究热点。多态变形技术是一种新型隐藏技术,它使得传统的基于特征码的检测技术相对滞后,论文详细阐述了恶意代码变种生成技术,主要包括加密技术、多态技术、变形技术。深入研究了m序列的随机性和状态遍历特性,提出的基于m序列的多态方法,能够有效提高恶意代码多态的效率和随机性。 The deep hiding and detecting technology of malicious code has already become one of the research hotspots in computer security. And the technology of polymorphism and metamorphism is a new hiding technology. The application of polymorphism and metamorphism also makes the sequence codebased detection lag behind. This thesis elaborates the technology of creating malicious code mutation, including encryption, polymorphism and metamorphism. The randomicity and all condition reached characteristics of m sequence are analyzed. Then the polymorphism based on m sequence is proposed, which can improve the efficiency and randomicity of malicious code polymorphism.
出处 《计算机与数字工程》 2008年第10期149-153,共5页 Computer & Digital Engineering
关键词 恶意代码 加密 多态 变形 M序列 malicious code, encrypt, polymorphism,metamorphism, m sequence
  • 相关文献

参考文献10

  • 1Lucy Sherriff. Encryption vs antivirus [EB/OL]http://www.theregister.co. uk/2001/02/07/encryption_ vs_antivirus, 2001-02-07
  • 2Vesselin Vladimirov Bontchev. Future Trends in Virus Writing[C]. Proc 1st AVAR Conf, 2000
  • 3Tarkan Yetiser. Polymorphic Virus:Implementation, Detection and Protection [A]. VDS Advenced Re search Group, 1993,1
  • 4Carey Nachtenberg, Understanding and Managing Polymorphic Virus [EB/OL]. The Symantec Enterprise Paper, 1999,9
  • 5Ellen Messmer. Experts predict more mutating virus [EB/OL]. CNN. com Technology. 2000-10. http:// www. cnn. com/2000/TECH/computing/10/31/virus.havock. idg/index.html
  • 6Hume.病毒和网络攻击中的多态、变形技术原理分析及对策.X’CON,2003,(12).
  • 7W. Wong. Analysis and detection of metamorphic computer viruses [D]. Masters Thesis, Department of Computer Science, San Jose State University, 2006
  • 8刘运,殷建平,蒋晓舟.一类基于循环群理论的变形机理分析[J].海军工程大学学报,2004,16(5):5-9. 被引量:1
  • 9Miodrag Zivkovi. A Table of Primitive Binary Polynomicals [J]. Mathematics of Computation. 1994, 62 (205) : 385-386
  • 10Shift Registers and Counters [EB/OL]. CS150 Lab 5. Spring, 1997

二级参考文献3

  • 1[3]Cohen F. Computer virus-theory and experiments [J]. Computer and Security,1987,6(1) :22-35.
  • 2祝恩 殷建平.计算机病毒的本质特性分析及检测[J].计算机科学,2001,28:238-238.
  • 3祝恩,殷建平,蔡志平,赵建民.计算机病毒自动变形机理的分析[J].计算机工程与科学,2002,24(6):14-17. 被引量:17

同被引文献22

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部