期刊文献+

一种特洛伊木马的检测算法 被引量:8

A Kind of Algorithm for Checking Trojan Horse
下载PDF
导出
摘要 运用字母集合到数字集合的映射理论、字符串的可计算性理论与数论理论 ,设计了一种特洛伊木马的检测算法 ,该算法能够有效地检测出特洛伊木马 ,同已有的检测算法相比 ,速度较快 ,不但适合字母文字的可执行程序检测 。 In this paper, using the mapping from letter set to number set theory, the computability of string and number theory, we design a kind of algorithm for checking Trojan Horse in a given program. This algorithm can check out the Trojan Horse hidden in a executive program effectively. Comparing with the known algorithm, this new algorithm runs fast and it is suitable for checking the executive program encoded with letter language together with the programs encoded with non letter language.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第7期1371-1373,共3页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目 ( 10 0 710 48)资助 陕西省"十五"科技攻关项目 ( 2 0 0 0 K0 8-G12 )资助
关键词 特洛伊木马 检测 算法 程序指纹 trojan horse check algorithm program fingerprint
  • 相关文献

参考文献5

  • 1Anonymous. Maximum Security Eng (Second Edition)[M]. N.Y:Sams Publishing, 1998.
  • 2R. L. Rivest. The MD5 message digest algorithm[S]. RFC1321 Apr 1992.
  • 3Schneier. Applied cryptography. Second edition. Protocol, algorithm, and source code in C^[M], N.Y. John Wiley & Sons, Inc.1996.
  • 4Davis M D. Weyuker Elaine J. Computability, complexity, and languages fundamentals of theoretical computer science[M]. N.Y. Academic Press, Inc. 1983, 70-75.
  • 5Pan Chengdong, Pan Chengbiao. Primary Number theory (In Chinese) [M],Beijing.. Beijing University Press,1992.

同被引文献46

引证文献8

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部