期刊文献+

恶意计算机程序基因形式化研究

Malware genetic formalization analysis research
下载PDF
导出
摘要 随着互联网的爆发式发展,恶意计算机程序也呈现快速增长趋势。针对恶意计算机程序加壳、加密、混淆等复用手段,传统的恶意计算机程序检测手段越来越费时费力。针对日益增长的恶意计算机程序变种的检测,因受到生物基因检测的启发,从恶意计算机程序的汇编执行代码指令出发,研究恶意计算机程序基因的形式化表达,提出了基于恶意计算机程序基因的通用萃取模型。通过采集的1 000例恶意计算机程序样本进行对比实验,实验结果表明本文提出的恶意计算机程序基因萃取模型优于传统的恶意计算机程序计算算法。 As the Internet exploded,varieties of malicious computer programs arise.Traditional detection methods of malware are more and more time consuming and laborious,in face of the application of encryption and obfuscation.Inspired by biological gene detection,this paper studies the formal expression of malware genes,and proposes a general extraction model based on malware genes.In this paper,1000 samples of malware are collected for comparison experiments.The experimental results show that the proposed malware gene extraction model is due to the traditional calculation algorithm of malware.
作者 丁建伟 陈周国 刘义铭 Ding Jianwei;Chen Zhouguo;Liu Yiming(Science and Technology on Communication Security Laboratory,30th Research Institute ofChina Electronics Technology Group Corporation,Chengdu 610041,China)
出处 《信息技术与网络安全》 2019年第11期35-40,共6页 Information Technology and Network Security
基金 国家重点研发计划(2017YFC080700)
关键词 恶意程序分析 程序基因 程序基因形式化建模 malware analysis malware gene malware gene formalization
  • 相关文献

参考文献2

二级参考文献34

  • 1罗洁,张国臣.谨防电子物证提取和检验中的“污染”[J].刑事技术,2007,32(2):43-43. 被引量:12
  • 2CARVEY H. Windows forensic analysis[ M]. 2nd ed. Waltham: Syngress, 2007: 157.
  • 3[美]EILAME.逆向工程揭秘[M].韩琪,译.北京:电子工业出版社,2007:4-16.
  • 4COHEN M, GARFINKEL S, SCHATZ B. Extending the advanced forensic format to accommodate multiple data sources, logical evi- dence, arbitrary information and forensic workflow[ EB/OL]. [ 2011 -01 -O1 ]. www. pyflag, net/papers/dfrws 2009. pdf.
  • 5FREDERIC B, SOLAL J. Digital forensics framework[ EB/OL]. [ 2010 - 01 - 08]. http://www, digital-forensic, org.
  • 6SZEWCZYK P, BRAND M. Malware detection and removal: An ex- amination of personal anti-virus software [ EB/OL]. [ 2008 - 05 - 09]. http://scissec, scis. ecu. edu. au/proceedings/2008/foren- sics/Szewczyk% 20% 20Malware% 20detection. pdf.
  • 7TWCERT/CC. Spware forensic with reversing and static analysis [ EB/OL]. [ 2010 - 03 - 17]. http://www, hitcon, org/Download/ 2010/Spyware% 20Forensic% 20With% 20Reversing% 20and% 20Static% 20Analysis. pdf.
  • 8OVERTON M. Malware forensics: detecting the unknown[ EB/OL]. [2009 -07 -23]. http://momusings, co. uk/Documents/VB2008- Malware-Forensics-I. 01. pdf.
  • 9Small S,Mason J,Monrose F,Provos N,Stubblefield A.To catch a predator:A natural language approach for eliciting malicious payloads. Proc.of the 17th USENIX Security Symp.(Security 2008) . 2008
  • 10Kruegel C,Robertson W,Valeur F,Vigna G.Static disassembly of obfuscated binaries. Proc.of the 13th Conf.on USENIX Security Symp.(Security 2004) . 2004

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部