期刊文献+

基于钩子技术动态重建输入表的研究

Dynamical Rebuilding Import Address Table based on Hook Technique
原文传递
导出
摘要 重建输入表可能是逆向工程师们经常遇到的问题,但重建输入表有时既费时又费力,现在很多壳和病毒会破坏输入表,而且是各出奇招,常用的输入表修复工具根本不起作用。这时如果手工修复,重建输入表可能要花费大量的时间。针对重建输入表提出了一种新的思路和方法,实验结果表明,该方法能够动态地重建输入表,对于被破坏的输入表也具有一定的重建能力,大大缩减了重建输入表花费的时间并且可以排除部分手工修复产生的错误。 The rebuilding Import Address Table(IAT) may be a normal work for a reverse engineer,but sometimes can also be a very time-consuming and tedious process,what worse is that some Packer and virus might destroy the import address table with various special ways. The common IAT rebuilders fail to rebuild the IAT,and to rebuild it by hand would cost too much time. This paper proposes a new idea and a novel method to rebuild the IAT dynamically,and the experiment indicates that this method could rebuild the destroyed IAT,while greatly reduce the time for rebuilding the IAT and avoid some mistakes in hand-rebuilding.
出处 《信息安全与通信保密》 2011年第6期66-68,共3页 Information Security and Communications Privacy
关键词 钩子 重建 PE格式 IAT hook rebuilding PE IAT
  • 相关文献

参考文献8

  • 1朱天明,刘嘉勇.基于代码搬移的PE文件信息隐藏[J].通信技术,2010,43(8):184-186. 被引量:4
  • 2段钢.加密与解密[M].第3版.北京:电子工业出版社,2009.
  • 3杨平,罗红,乔向东.基于句柄分析的Windows Rootkit检测技术研究[J].通信技术,2009,42(4):135-138. 被引量:2
  • 4WANG Yulin,SHEN Yang,PAN Jian.Usage Control Based on Windows Kernel Hook[C].Jeju Island,South Korea:International Conference on Information and Multimedia Technology,2009:264-267.
  • 5MARHUSIN Mohd Fadzli,LARKIN Henry,LOKAN Chris,et al.An Evaluation of API Calls Hooking Performance[C].Suzhou,China:Computational Intelligence and Security,2008:315-319.
  • 6RABER Jason,KRUMBEUER Brian.Hyatt Regency Crystal City:.QuietRIATT:Rebuilding the Import Address Table Using Hooked DII Calls[R].[s.l.]:Riverside Research Institute,2009.
  • 7MOSER Andreas,KRUEGEL Christopher,KIRDA Engin.Exploring Multiple Execution Paths for Malware Analysis[C].Berkeley,California:IEEE Symposium on Security and Privacy,2007:231-245.
  • 8WILLEMS Carsten,HOLZ Thorsten,FREILING Felix.Toward Automated Dynamic Malware Analysis Using CWSsandbox[J].IEEE Security and Privacy,2007,05(02):32-39.

二级参考文献10

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部