期刊文献+

恶意代码同源判定技术综述 被引量:2

Homology Judgment Technology of Malicious Code
下载PDF
导出
摘要 近年来,恶意代码日益泛滥,时刻威胁着人们的信息财产安全。经研究,很多新型的恶意代码都是已有恶意代码的变种,并通过加壳、多态、代码扰乱等技术对已有恶意代码进行处理,以躲避传统检测技术。因此,研究恶意代码的同源判定技术,根据静态、动态、动静结合的分类方式,对恶意代码同源判定技术进行总结与归类,阐述各种判定方法的基本原理、实现细节、特点及优缺点,以期有效、快速地解决新型恶意代码的检测与处理问题。最后,为促使研究进一步进行,展望了恶意代码同源判定技术的发展方向。 The proliferation of malicious code threatens the information and property security of the people at all times. The facts indicate that many new types of malicious code are variants of the existing code, and by using the deformation, packing, polymorphism, code disruption and other technologies to modify these existing malicious codes, the scanning from traditional detection technologies could be avoided. For this reason, and based on static mode, dynamic and combination of both modes, the homology judgment technologies of malicious codes are summarized and classified, and their basic principles, implement details, features, strengths and limitations also discussed, expecting to effectively solve the detection and processing of newly-emerging malicious codes. Finally, the development direction of homology judgment technologies is forecasted, thus to promote the further research.
出处 《通信技术》 2017年第7期1484-1492,共9页 Communications Technology
关键词 恶意代码 同源判定 代码结构 行为特征 malware homology judgment code structure behavioral feature
  • 相关文献

参考文献9

二级参考文献108

  • 1董志强,肖新光,张栗伟.编码心理学分析病毒同源性[J].信息安全与通信保密,2005(8):55-59. 被引量:9
  • 2苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 3李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 4王硕,周激流,彭博.基于API序列分析和支持向量机的未知病毒检测[J].计算机应用,2007,27(8):1942-1943. 被引量:21
  • 5Microsoft security intelligence report. 2007. http://www.microsoft.com/downloads/details.aspx?FamilylD=4EDE2572-1D39-46EA- 94C6-4851750A2CB0.
  • 6Wang Z, Pierce K, McFarling S. BMAT--A binary matching tool for stale profile propagation. The Journal of Instruction-Level Parallelism, 2000,2:23-43.
  • 7Bayer U, Comparetti PM, Hlauscheck C, Kruegel C, Kirda E. Scalable, behavior-based malware clustering. In: Proc. of the Network and Distributed System Security Symp. (NDSS). San Diego, 2009. http://www.isoc.org/isoc/conferences/ndss/09/ proceedings.shtml.
  • 8Flake H. Structural comparison of executable objects. In: Proc. of the Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004). 2004.83-97.
  • 9Dullien T, Rolles R. Graph-Based comparison of executable objects (English version). In: Proc. of the SSTIC 2005. 2005. http://www.sstic.org/2005/programme/.
  • 10Rabek JC, Khazan RI, Lewandowski SM, Cunningham RK. Detection of injected, dynamically generated, and obfuscated malicious code. In: Staniford S, Savage S, eds. Proc. of the 2003 ACM Workshop on Rapid Malcode. New York: Association for Computing Machinery, 2003.76-82. [doi: 10.1145/948187.948201].

共引文献79

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部