期刊文献+

基于逆向技术的恶意程序分析方法 被引量:9

Malware analysis method based on reverse technology
下载PDF
导出
摘要 逆向分析是恶意程序分析的常用方法之一,在揭示恶意程序意图及行为方面发挥着其他方法无法比拟的作用。着重从启动函数、函数参数传递、数据结构、控制语句、Windows API等方面归纳总结恶意程序反汇编代码一般规律,并结合一起利用恶意程序窃取QQ账号与密码的真实案例说明快速准确定位关键信息的具体方法。 Reverse analysis is the most common method in analyzing malware.The reverse analysis process is an advanced and efficient method that exposes the intention and processes of malware.The focus of this paper was to show the general patterns ascertained using reverse analysis applied to the aspects of start function,parameter transfer of function,data structure,control statement and Windows API.A case study of malware,used to obtain account information,login names,and passwords for the popular Chinese social networking program "QQ",was presented to illustrate how the reverse analysis quickly and accurately locates key information used to determine general patterns.
作者 罗文华
出处 《计算机应用》 CSCD 北大核心 2011年第11期2975-2978,共4页 journal of Computer Applications
基金 公安部应用创新计划项目(2011YYCXXJXY121)
关键词 逆向技术 启动函数 参数传递 数据结构 控制语句 WINDOWSAPI reverse technology start function parameter transfer data structure control statement Windows API
  • 相关文献

参考文献8

  • 1CARVEY H. Windows forensic analysis[ M]. 2nd ed. Waltham: Syngress, 2007: 157.
  • 2[美]EILAME.逆向工程揭秘[M].韩琪,译.北京:电子工业出版社,2007:4-16.
  • 3COHEN M, GARFINKEL S, SCHATZ B. Extending the advanced forensic format to accommodate multiple data sources, logical evi- dence, arbitrary information and forensic workflow[ EB/OL]. [ 2011 -01 -O1 ]. www. pyflag, net/papers/dfrws 2009. pdf.
  • 4FREDERIC B, SOLAL J. Digital forensics framework[ EB/OL]. [ 2010 - 01 - 08]. http://www, digital-forensic, org.
  • 5SZEWCZYK P, BRAND M. Malware detection and removal: An ex- amination of personal anti-virus software [ EB/OL]. [ 2008 - 05 - 09]. http://scissec, scis. ecu. edu. au/proceedings/2008/foren- sics/Szewczyk% 20% 20Malware% 20detection. pdf.
  • 6TWCERT/CC. Spware forensic with reversing and static analysis [ EB/OL]. [ 2010 - 03 - 17]. http://www, hitcon, org/Download/ 2010/Spyware% 20Forensic% 20With% 20Reversing% 20and% 20Static% 20Analysis. pdf.
  • 7OVERTON M. Malware forensics: detecting the unknown[ EB/OL]. [2009 -07 -23]. http://momusings, co. uk/Documents/VB2008- Malware-Forensics-I. 01. pdf.
  • 8罗洁,张国臣.谨防电子物证提取和检验中的“污染”[J].刑事技术,2007,32(2):43-43. 被引量:12

二级参考文献1

共引文献11

同被引文献60

  • 1陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 2刘晖.基于虚拟机的网格计算模型[J].科学技术与工程,2005,5(16):1209-1211. 被引量:1
  • 3黄会群.逆向工程技术研究[J].计算机与数字工程,2005,33(12):46-49. 被引量:4
  • 4刘通平.栈溢出的动态检测技术[J].计算机科学,2007,34(9):282-286. 被引量:8
  • 5P.Cousot,R.Cousot. Abstract interpretation:a unified lattice model for static analysis of programs by comtruction or approximation of fixpoints[A].New York:ACM Press,1977.238-252.
  • 6S.Bardin,P.Herrmann,J.Leroux,O.Ly,R.Tabary. The bincoa framework for binary code analysis[A].2011.165-170.
  • 7Serge Chaumette,Olivier Ly,Renaud Tabary. Automated Extraction of Polymorphic Virus Signatures using Abstract Interpretation[A].2011.41-48.
  • 8Avira. (2004) W32/bolzano virus[EB/OL].http://www.avira.com/fr/support-threats-summary/tid/6061/threat/W32.Bolzano.5396,2011.
  • 9Sni Ashkan,Yadegari Babak. Malware detection b0.ed on minhlg API calls[A].2010.1020-1025.
  • 10Hart Kyotmg Soo,K,zaag Boojoong. Malware cla.sificafion using instruction frequencies[A].2011.298-29X.

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部