期刊文献+

恶意代码行为获取的研究与实现 被引量:7

Research and implementation of obtaining malicious code behavior
下载PDF
导出
摘要 分析对比了恶意代码的静态分析方法和动态分析方法,设计并实现了一种结合虚拟机技术和Windows操作系统自身所具有的调试功能来获取恶意代码行为的模块,该模块能够自动控制虚拟机运行监控程序来获取恶意代码的行为,并通过引入基于信息增益的特征权重算法来获得行为特征。 Based on the analysis and comparison of the malicious code static analysis and dynamic analysis methods, the authors designed and implemented a module through putting forward a combination of virtual machine technology and Windows operating system which had its own debugging function to obtain the behavior of malicious code, the module could automatically operate a virtual machine to run a monitoring program to obtain the behavior of malicious code, and got behavior feature by features weight algorithm based on information gain.
作者 陈培 高维
出处 《计算机应用》 CSCD 北大核心 2009年第B12期76-78,82,共4页 journal of Computer Applications
关键词 恶意代码 虚拟机 系统调用 静态分析 行为分析 malicious code virtual machine system call static analysis action analysis
  • 相关文献

参考文献8

二级参考文献12

  • 1宋枫溪,郑如冰,王积忠.自动文本分类中两种文本表示方式的比较[J].计算机工程,2004,30(18):124-126. 被引量:6
  • 2李文斌,刘椿年,陈嶷瑛.基于特征信息增益权重的文本分类算法[J].北京工业大学学报,2006,32(5):456-460. 被引量:19
  • 3Tumer D, Entwisle S. Symantec Intemet Security Thread Report Trends[R]. Symantec Inc., 2006.
  • 4Szor P, Ferrie E Hunting for Metamorphic[C]//Proc. of the llth International Virus Bulletin Conference. Prague, Czech Republic: [s. n.], 2001.
  • 5Walenstein A, Mathur R. Normalizing Metamorphic Malware Using Term Rewrifing[C]//Proc. of the 6th IEEE Workshop on Source Code Analysis and Manipulation. Philadelphia, PA, USA: [s. n.], 2006.
  • 6Christodorescu M, Jha S. Semantics-aware Malware Detection[C]// Proc. of IEEE Symposium on Security and Privacy. Oakland, California, USA: [s. n.], 2005.
  • 7Finjan Inc. Behavior-based Security[Z]. 2006.
  • 8Collberg C S, Thomborson C. Watermarking, Tamper-proofing and Obfuscation Tools for Software Protection[J]. IEEE Transactions on Software Engineering, 2002, 28(8): 735-746.
  • 9Pietrek M. An In-depth Look into the Win32 Portable Executable File Format[EB/OL]. [2002-02-011. http://msdn.microsoft.com/ msdnmag/issues/02/02/default.aspx.
  • 10鲁松,李晓黎,白硕,王实.文档中词语权重计算方法的改进[J].中文信息学报,2000,14(6):8-13. 被引量:120

共引文献44

同被引文献63

  • 1郑海洋.普通恶意代码技术分析与检测[J].现代经济信息,2008(10):79-80. 被引量:1
  • 2贾春福,钟安鸣,周霞,田然,段雪涛.基于系统调用的Linux系统入侵检测技术研究[J].计算机应用研究,2007,24(4):147-150. 被引量:7
  • 3卡巴斯基实验室. 卡巴斯基2010年一季度信息安全威胁报告[EB/OL]. (2010-06-11). http://www.kaspersky.com.cn/KL-AboutUs/ news2010/06n/100609a.htm.
  • 4Bruening D L. Efficient, Transparent, and Comprehensive Runtime Code Manipulation[D]. Massachusetts, USA: Massachusetts Institute of Technology, 2004.
  • 5Seiferta C, Steensona R, Welcha I, et al. Capture: A Behavioral Analysis Tool for Applications and Documents[C]//Proc. of the 7th Annual Digital Forensic Research Workshop. Boston, USA: [s. n.], 2007.
  • 6Willems C, Holz T, Freiling F. Toward Automated Dynamic Malware Analysis Using CWSandbox[J]. IEEE Security Privacy, 2007: 5(2): 32-39.
  • 7Bayer U, Kruegel C, Kirda E. TTAnalyze: A Tool for Analyzing Malware[C]//Proc. of the 15th EICAR Conference. Hamburg, Germany: [s. n.], 2006.
  • 8Bellard F. QEMU: A Fast and Portable Dynamic Translator[C]// Proc. of USE NIX Annual Technical Conference. San Francisco, USA: [s. n.], 2005: 41-46.
  • 9Anubis: Analyzing Unknown Binaries[EB/OL]. (2010-08-21). http://anubis .iseclab.org.
  • 10Forrest S,Hofmeyr S A,Somayaji A.A Sense of Self for UNIXProcesses[C]//Proc.of IEEE Symposium on Security and Privacy.[S.l.]:IEEE Press,1996.

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部