期刊文献+

Windows恶意代码动态通用脱壳方法研究 被引量:5

Research of dynamic general unpacking methods for Windows malware
下载PDF
导出
摘要 加壳技术为程序保护提供了一种新的思路,但同时也成为恶意代码的保护伞.恶意软件通过加壳可以批量、快速地生成海量变种,给分析人员带来极大的困扰.因此,研究脱壳技术成为解决该问题的一种有效方法.传统的脱壳方法如UPX、ASProtect等针对的是特定种类的壳,因其不能应付壳的版本与种类的变化而逐渐无法适用,研究一种通用的动态脱壳方法是极为必要的.根据加壳程序执行时都要在内存中还原原始代码的特点,在动态二进制分析平台的基础上提出了一种基于内存标记的动态通用脱壳方法.实验表明,该方法无需先验知识就可以有效地定位加壳程序的原始入口点,提取出程序的原始代码,具有较好的脱壳效果. Code packing brings a new conception to protect software, but it also serves as an umbrella for malicious code. It has been intensified that malware using packing techniques to evade detection and it troubles analysts due to the massive variants of malware produced by code packing. Traditional unpac- king methods based on feature matching gradually become inapplicable because they can't cope with the change of shell version and type, so a general unpacking method would be very useful. In this paper, the authors proposed a common unpacking method based on dynamic binary analysis platform, according to the property that packer will restore the original code during the process of executing. The experimental results show that this method can effectively locate the original entry point of the program, extract the code that has been hidden, and can get the accurate image size of the process in the memory, which can effectively realize dynamic unpacking of the shell code.
作者 郭文 王俊峰 GUO Wen, WANG Jun-Feng(College of Computer Science, Sichuan University, Chengdu 610065, Chin)
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2018年第2期283-289,共7页 Journal of Sichuan University(Natural Science Edition)
基金 国家重点研发计划(2016YFB0800605 2016QY06X1205) 国家科技重大专项(2015ZX01040101-002) 四川省软科学计划(2016ZR0087)
关键词 恶意代码 脱壳 动态分析 Decaf-platform Malware Code unpacking Dynamic analysis Decal-platform
  • 相关文献

参考文献6

二级参考文献42

  • 1曾勇军,朱俊虎,奚琪.程序自动脱壳数据采集技术研究[J].计算机应用,2009,29(3):813-816. 被引量:3
  • 2于淼,孙强.对加壳技术的改进:超粒度混杂技术[J].计算机应用,2004,24(8):137-139. 被引量:9
  • 3董志强,肖新光,张栗伟.编码心理学分析病毒同源性[J].信息安全与通信保密,2005(8):55-59. 被引量:9
  • 4陈勤,贾琳飞,张蔚.基于代码与壳互动技术的软件保护方法研究[J].计算机工程与科学,2006,28(12):36-37. 被引量:5
  • 5锻钢.加密与解密[M].3版.北京:电子工业出版社,2008.
  • 6Yang-seo Choi,Ik-kyun Kim,Jin-tae Oh,et al.PE File Header Analysis-based Packed PE File Detection Technique (PHAD)[C] //International Symposium on Computer Science and its Applications,2008,28:28-31.
  • 7王爽.汇编语言[M].2版.北京:清华大学出版社,2008.
  • 8戚利.WINDOWSPE权威指南[M].北京:电子工业出版社,2010.
  • 9ROYAL P, HALPIN M, DAGON D, et al. PolyUnpack Automating the hidden-code extraction of unpack-executing malware [C]//Proceeding of 2006 Annual Computer Security Applications Conference(ACASC). Washingon,DC:IEEE Computer Society,2006:289-300.
  • 10Snaker. PEiD [ EB/OL]. [ 2014-.06-01 ]. http://www, so/tpedia, com/publisher/snaker46242, html.

共引文献36

同被引文献25

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部