期刊文献+

基于离线汇编指令流分析的恶意程序算法识别技术 被引量:4

Malware algorithm recognition based on offline instruction-flow analyse
原文传递
导出
摘要 识别二进制程序中的算法,在恶意程序检测、软件分析、网络传输分析、计算机系统安全保护等领域有着广泛的应用和重要的意义。该文提出基于离线汇编指令流分析的恶意代码算法识别技术,综合运用二进制插桩、污点跟踪、循环识别等技术,从行为语义、关键常数2个维度对程序进行描述,并且分析提取特征。算法识别模型使用机器学习算法,针对双维度特征生成初阶识别模型,并通过模型融合优化识别效果,实现对广义程序算法的高准确率识别。 Binary program algorithm identification is widely used for malware detection, software analyse, network encryption analyse and computer system protection. This paper describes a malware algorithm recognition method using offline instruction flow analyses using binary instrumentation, taint traces, and loop recognition. The algorithm features are described including the behavior semantics and key constants extracted from the instruction-flow algorithm. Two machine learning models trained by these features are merged into one accurate recognition algorithm.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第5期484-492,共9页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61272493) 中央高校基本科研业务费专项资金资助项目(2014ZD03-03) NSFC-通用技术基础研究联合基金资助项目(U1536122)
关键词 算法识别 污点跟踪 机器学习 恶意程序检测 algorithm recognition malware detection
  • 相关文献

参考文献14

  • 1Vyacheslav Zakorzhevsk. 卡巴斯基实验室每天检测到32.5万个最新恶意文件[Z/OL].[2014-12-03] . http://news.kaspersky.com.cn/news2014/12n/141203.htm.
  • 2Calvet J, Fernandez J M, Marion J Y. Aligot:Cryptographic function identification in obfuscated binary programs[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York, USA:ACM, 2012:169-182.
  • 3Leder F, Martini P, Wichmann A. Finding and extracting crypto routines from malware[C]//Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International. Piscataway, NJ:IEEE Press, 2009:394-401.
  • 4Cui B, Wang F, HaoY, et al. A taint based approach for automatic reverse engineering of gray-box file formats[J].Soft Computing, 2015:1-16.
  • 5Wang Z, Jiang X, Cui W, et al. ReFormat:Automatic reverse engineering of encrypted messages[C]//Proceedings of the 14th European Conference on Research in Computer Security. Berlin, GER:Springer-Verlag, 2008:200-215.
  • 6Lutz N. Towards revealing attackers intent by automatically decrypting network traffic[J]. Eth Zuerich, 2008(8):1-52.
  • 7李继中,蒋烈辉,舒辉,戴理.基于动态数据流的密码函数加解密过程分析[J].计算机应用研究,2014,31(4):1185-1188. 被引量:1
  • 8Gr bert F, Willems C, Holz T. Automated identification of cryptographic primitives in binary programs[J].Lecture Notes in Computer Science, 2011,6961:41-60.
  • 9张经纬,舒辉,蒋烈辉,李继中.公钥密码算法识别技术研究[J].计算机工程与设计,2011,32(10):3243-3246. 被引量:6
  • 10李洋,康绯,舒辉.基于动态二进制分析的密码算法识别[J].计算机工程,2012,38(17):106-109. 被引量:7

二级参考文献37

  • 1叶生勤.公钥密码理论与技术的研究现状及发展趋势[J].计算机工程,2006,32(17):4-6. 被引量:15
  • 2程克非,张聪.基于特征加权的朴素贝叶斯分类器[J].计算机仿真,2006,23(10):92-94. 被引量:40
  • 3邓维斌,王国胤,王燕.基于Rough Set的加权朴素贝叶斯分类算法[J].计算机科学,2007,34(2):204-206. 被引量:43
  • 4Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone.应用密码学手册[M].北京:电子工业出版社,2005-6.12-14.
  • 5Kinder J,Katzenbeisser S,Schllhart C.Detecting malicious code by model checking[C].Vienna:Proceeding of the GISIG SIDAR Conference on Detection of Instrusions and Malware & Vulnera- bility Assessment.Springer,2005:174-187.
  • 6Christodorescu M,Jha S,Seshia S A.Semantics-aware Malware detection[C].IEEE Symposium on Security and Privacy,2005: 32-46.
  • 7段刚.加密与解密[M].3版.北京:电子工业出版社,2008:167-191.
  • 8Schwarz B,Chen H,Wagner D.Model checking an entire linux distribution for security violation[C].Los Alamitos,CA:Proc An- nual Computer Security Applications Conference. IEEE Com- puter Society,2005:13-22.
  • 9Chirs Eagle.The IDA pro book[M].石华耀,译.北京:人民邮电出版社,2010:162-172.
  • 10Hex-Rays SA.Hex-Rays decompiler[EB/OL], http://www.hex- rays.com/,2005.

共引文献13

同被引文献47

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部