摘要
为有效提取恶意程序及其变种中的隐式API调用行为,提出一种基于静态分析的隐式API调用行为检测方法。采用指令模板匹配的方法识别具体调用形式,通过分析调用目标地址与函数名之间的关系来识别被调用API函数。实验结果表明,该方法能提高静态分析工具对恶意代码及其变体的检测能力。
To extract API-calling behaviors from malware and their variants effectively,this paper proposes an approach to statically detect the obfuscated API-calling behaviors in Windows platform.In this approach,instruction pattern matching is used to recognize the special calling manner.The relationship between the targets of call instructions and the name strings of API functions is analyzed to identify which API function is called actually.Experimental results show that using this approach can improve detection ability of static analysis tools through static analysis.
出处
《计算机工程》
CAS
CSCD
北大核心
2010年第14期108-110,共3页
Computer Engineering
基金
国家"863"计划基金资助项目(2006AA01Z408
2009AA01Z434)
河南省重大科技攻关基金资助项目(092101210500
092101210501)