期刊文献+

计算机病毒的变形技术及变形引擎研究 被引量:1

Metamorphic technology and engine of computer virus
下载PDF
导出
摘要 变形病毒将成为未来计算机病毒发展的趋势,研究病毒的变形技术及变形引擎十分必要。在概括病毒变形技术的原理和发展的基础上,分析了变形引擎的基本结构和流程,给出了一种变形引擎的具体实现方法,并详细介绍了其中各模块的功能和算法,同时也对其中涉及到的指令剥离、指令相关性分析以及随机数生成等关键技术的实现进行了讨论,最后对通过该引擎变形后病毒的抗查杀能力进行了测试。 Metamorphic virus will be the trend in development ofcomputer virus in the future. It is necessary to research the metamorphic technology and metamorphic engine ofvirus. The metamorphic theory and development ofcomputer virus is generalized, then thebasic structure and flow are analyzed, the detailed design of two metamorphic engines is brought forward, and the function and arithmetic of every module is introduced in those engines detailedly. It also makes a discuss on the key technology that must be resolved in the implementationofmetamorphicengine, including instruction uncovered technique, instruction dependency parsing technique and generation of random number. At last, it makes a test On virus' ability of opposing detection of anti-virus software after metamorphosing.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第2期314-317,共4页 Computer Engineering and Design
关键词 病毒 多态 变形 变形引擎 指令剥离 virus polymiorphism metamorphose metamorphic engines instruction uncovertechnique
  • 相关文献

参考文献6

二级参考文献15

  • 1李冰.关于主动防治计算机病毒的几点探讨[J].中央民族大学学报(自然科学版),2001,10(2):170-174. 被引量:9
  • 2张波云,殷建平,张鼎兴,嵩敬波.基于K-最近邻算法的未知病毒检测[J].计算机工程与应用,2005,41(6):7-10. 被引量:15
  • 3Holy_Father, How to Become Unseen on Windows NT [ J-OL]. 29a issue#7,2003.
  • 4SnaiX.Windows的自启动方式[ EB/OL]. http://www. xfocus. net/articles/200310/632. html,2003-10.
  • 5Hume.病毒和网络攻击中的多态、变形技术原理分析及对策[ EB/OL ]. http ://www. xfocus. net,2003-12.
  • 6Diomidis Spinellis.Reliable identification of bounded-lengthviruses is NP-complete[J].IEEE Transactions on information Theory,2003,49(1):280-284.
  • 7Gerald J Tesauro,Jeffrey O Kephart.Neural networks for computer virus recognition[J].IEEE Expert,1996,8:5-6.
  • 8Schultz M,Eskin E,Zadok E,et al.Data mining methods for detection of new malicious executables[A].Roger Needham Proceedings of the 2001 IEEE Symposium on Security and Privacy[C].Washington:IEEE press,2001.38-49.
  • 9Bargiela,Pedrycz A,Hirota W.Granular prototyping in fuzzy clustering[J].IEEE Transactions on Fuzzy Systems,2004,12(5):697-709.
  • 10Kruglinski David J,Scot Wingo,George Shepherd.Programming Visual C++[M].Washington:Micosoft Press,1998.

共引文献17

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部