期刊文献+

一种基于签名和属性的可执行文件比较 被引量:5

Comparison of Executable Objects Based on Singatures and Properties
下载PDF
导出
摘要 可执行文件比较广泛应用于软件版权检测、恶意软件家族检测、异常检测的模式更新以及补丁分析.传统方法无法满足应用对速度和精度的要求.在函数、基本块和指令级别上设计了一元指令签名、基于函数控制流程图邻接矩阵的函数一元结构签名、指令的强/中/弱一元签名,并提出了融合签名和属性的函数匹配算法、基本块匹配算法,从而简化了已有指令比较,可抗指令重排,优于SPP.并通过匹配权统计以及严格的最大唯一匹配策略和Hash进一步降低误报,提高效率.最后,实现原型工具PEDiff,并通过实验证实了该比较方法在速度和精度上具有良好的性能. Comparison of executable objects is widely used for software copyright, malware family, updating pattern of abnormity detection and software patch analysis. The traditional comparison methods can not meet the requirements of these applications in terms of speed and accuracy. A function unary structural signature based on adjacency matrix of a CFC-, and an unary instruction signature are designed to consider the instruction on a function; according to instruction code and operand, strong/medium/weak signatures about instruction sequences are designed to make instruction comparison easy, and weak signature can handle instruction reorder outweighing small primes product (SPP); three kinds of properties are appended to partition all objects into more groups. And then, comparison methods for functions and basic code blocks are presented using the above Signatures and proproties, and the matching policies using both statistical weights and the largest exclusive are exploited to decrease the false match. Furthermore,the Hash of signtures and properties is used to speed up the match. Finally, a protocol tool PEDiff is implemented using the above methods. Experimental results demonstrate that the method has better performance in terms of matching speed and rich analysis results.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第11期1868-1876,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(90718005) 国家"九七三"重点基础研究发展计划基金项目(2007CB310800) 国家"八六三"高技术研究发展计划基金项目(2007AA01Z411)~~
关键词 二进制分析 反汇编 结构签名 指令签名 控制流程图 binary analysis disassemble structural signature instruction signature control flow graph
  • 相关文献

参考文献2

二级参考文献17

  • 1Aho A V,Sethi R,Ullman J D.Compilers Principles,Techniques,and Tools[M]北京:机械工业出版社,2003.
  • 2Hoqlund G,Mcgraw G.Exploiting Software:How to Break Code.Addison Wesley,2004
  • 3Currie D W,Hu A J,Rajan S.Automatic formal verification of DSP software.In:Proceedings of the 37th Annual ACM IEEE Conference on Design Automation(DAC'00),ACM Press,2000.130~135
  • 4Feng X,Hu A J.Automatic formal verification for scheduled VLIW code.In:Proceedings of the JointConference on Languages,Compilers and Tools for Em-bedded Systems & Software and Compilers for Embed-ded Systems (LCTES/SCOPES' 02),ACM-Press,2002.85~92
  • 5Necula G C.Translation validation for an optimizing compiler.In:Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation (PLDI'00),ACM Press,June 2000.83~94
  • 6Pnueli A,Siegel M,Singerman E.Translation validation.In:Proceedings of the 4th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'98).vol 1384,Lecture Notes in Computer Science.Springer-Verlag Heidelberg,Mar 1998.151~166
  • 7Sabin T.Comparing binaries with graph isomorphisms.http://razor.bindview.com/publish/papers/comparing-binaries.html.2004
  • 8Dullien T,Rolles R.Graph-based comparison of executable objects.http://www.sabre-security.com/files/BinDiffSSTIC05.pdf.2005
  • 9DataRescue.IDA Pro disassembler.http://www.datarescue.com/idabase.2005
  • 10Colin Percival.An automated binary security update system for freeBSD[EB/OL].2003.http://www.daemonology.net/freebsdupdate/binup.pdf.

共引文献10

同被引文献48

引证文献5

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部