期刊文献+

基于语义特征的恶意代码检测综述 被引量:2

Survey on Malware Detection Based on Semantic Features
下载PDF
导出
摘要 通过对基于不同语义特征的恶意代码检测技术进行梳理归纳,厘清不同语义特征在恶意代码检测过程中的作用,为恶意代码检测技术路线、判定算法的选择奠定了基础。 Malware is one of the major threats to network security. The signature detection technolo- gy based on syntactic teatures could hardly adapt to the rapid evolution of malware. The detection technology based on semantic teatures has become the mainstream of malware analysis. According to the ditterent objects, the semantic teatures include assembly instruction, flow graph, system call, and comprehensive teatures. Among them, different objects can be organized in different ways. Through the analysis of malware detection technology based on different semantic teatures, it can clarify the role of ditterent semantic teatures in malware detection, and lay a good toundation for the selection of malware detection technology route and detection model.
作者 戴超 庞建民 张一弛 孙笛 岳峰 DAI Chao, PANG Jianmin, ZHANG Yichi, SUN Di, YUE Feng(Information Engineering University, Zhengzhou 450001 , China)
机构地区 信息工程大学
出处 《信息工程大学学报》 2018年第1期106-113,共8页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(61472447)
关键词 恶意软件 语义特征 汇编指令 流图 系统调用 malware semantic teatures disassembly instructions flow graph system call
  • 相关文献

参考文献6

二级参考文献46

  • 1张阳.基于信息流的多安全策略操作系统架构研究[J].计算机学报,2006,29(8):1453-1459. 被引量:2
  • 2苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 3夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 4Sung A H,Xu Jianyun,Chavez P,et al.Static Analyzer of Vicious Executables(SAVE)[C]//Proc.of the 20th Annual Computer Security Applications Conference.Tucson,USA:[s.n.],2004.
  • 5Kruegel C,Kirda E,Mutz D,et al.Automating Mimicry Attacks Using Static Binary Analysis[C]//Proc.of the 14th USENIX Security Symposium.Baltimore,USA:[s.n.],2005.
  • 6Xu Jianyun,Sung A H,Chavez P,et al.Polymorphic Malicious Executable Scanner by API Sequence Analysis[C]//Proc.of the Conference on Hybrid Intelligent Systems.Kitakyushu,Japan:[s.n.],2004.
  • 7Symantec. Internet security threat report, 2010 [EB/ OL]. http:// www. symantec. com/zh/cn/business/ theme. jsp? themeid= threatreport.
  • 8SONG D, BRUMLEY D, HENG Y, et al. BitBlaze: A New Approach to Computer Security via Binary Analysis[C]// In Proceedings of the 4th International Conference on Information Systems Security (ICISS). [S. L.]: IEEE, 2008,12.. 28 32.
  • 9MIHAI C, SOMESH J, SANJIT S, et al. Semantics-aware malware detection[C]//In Proceedings of the 2005 IEEE Security and Privacy Conference. [S. L. ]: IEEE, 2005, 8: 87-92.
  • 10JEFFREY W, CHIUEH T C. A forced sampled execution approach to kernel rootkit identification[C]// In Recent Advances in Intrusion Detection. [S. L.]: IEEE, 2007,9.. 219 235.

共引文献33

同被引文献49

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部