期刊文献+

基于混合分析的自动化脱壳技术研究

Research on Automatic Unpacking Technology Based on Hybrid Analysis
下载PDF
导出
摘要 针对当前对恶意代码自动化脱壳的研究不够充分的问题,在恶意代码静态分析和动态分析的基础上,提出基于混合分析的动态高效自动化脱壳方法。通过将动态二进制插桩与静态墒值计算相结合的混合分析方法,解决恶意代码脱壳过程中的OEP定位和导入表修复问题,提出基于混合分析的入口点OEP定位方法和基于静态指令流跟踪的导入表修复方法。最后,测试结果验证了该脱壳方法的有效性和通用性。 At present,the research on automatic unpacking of malicious code is not enough.Aiming at this problem,based on the static analysis and dynamic analysis of malicious code,this paper proposes a dynamic and efficient automatic unpacking method based on hybrid analysis.A hybrid analysis method,which combines dynamic binary instrumentation and static entropy calculation,is proposed to solve the problem of OEP location and import table repair in the process of malicious code unpacking.A hybrid analysis based on entry point OEP location method and a static instruction flow tracking based on import table repair method are proposed.Finally,the test results verify the effectiveness and generality of the method.
作者 徐旭 XU Xu(State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China)
出处 《信息工程大学学报》 2020年第1期55-60,67,共7页 Journal of Information Engineering University
关键词 混合分析 脱壳 OEP定位 导入表修复 hybrid analysis unpacking OEP location import table repair
  • 相关文献

参考文献3

二级参考文献29

  • 1曾勇军,朱俊虎,奚琪.程序自动脱壳数据采集技术研究[J].计算机应用,2009,29(3):813-816. 被引量:3
  • 2Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis [ C ]//Proceedings of the IEEE Sympo- sium on security and Privacy. 2007: 231-245.
  • 3Xie T, Tillmann N, De Halleux J, et al. Fitness-guided path exPloration in dynamic symbolic execution[ R]. Microsoft: MSR-TR-2008-123,2008.
  • 4Boonstoppel P, Cadar C, Engler D. RWset: Attacking path explosion in constraint-based test generation[ C ]//Tools and Algo- rithms for the Construction and Analysis of Systems. 2008 : 351-366.
  • 5Staats M, Pasareanu C. Parallel symbolic execution for structural test generation[ C ]//Proceedings of the 19th international symposium on Software testing and analysis(ISSTA 10). 2010 : 183-194.
  • 6Kim M, Kim Y, Rothermel G. A scalable distributed concolic testing approach: An empirical evaluation[ C ]//Software Tes- ting, Verification and Validation (ICST) , 2012 IEEE Fifth International Conference on. 2012: 340-349.
  • 7Ilfak Guilfanov. IDA fast library identification and recognition technology (FLIRT Technology) : In-depth[ EB/OL]. (2012- 02-27). [2013-03-11 ]. http://www. hex-rays. com/products/ida/tech/flirt/in_depth. shtml.
  • 8Dechter R. Constraint Processing[ M ]. San Francisco:Morgan Kaufmann Publishers,2003.
  • 9A pt K. Principles of Constraint Programming[ M ]. Cambridge:Cambridge University Press,2003.
  • 10Michael S, Adam G, Pedram A. Fuzzing:brute force vulnerability discovery[ M]. Addison-Wesley Professional, 2007.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部