期刊文献+

计算机病毒对抗检测高级技术分析 被引量:4

Analysis of Advanced Malware Bypassing Techniques
在线阅读 下载PDF
导出
摘要 从有效防范和清除计算机病毒的目的出发,深入剖析当前流行病毒的复杂性、欺骗性和对抗性特点及其背后的工作机理。研究表明,计算机病毒普遍采用了反代码分析、规避检测、欺骗隐身和暴力对抗四个方面的先进技术对抗安全软件的保护,计算机病毒与反病毒技术的斗争将趋于更加激烈。 This paper examines a set of typical computer virus and takes deep insight into complexity,stealth,armoring as well as other characters employed by malware to attentively bypass live behavioral protection of computer system.Anti-reverse engineering,decttion evasion,stealth and out-powering techniques are specifically analyzed and discussed to contribute to effective computer virus defense and system protection.
作者 贺朝晖
出处 《计算机安全》 2010年第10期93-97,共5页 Network & Computer Security
关键词 计算机病毒 对抗检测 分析 Computer virus Bypassing Protection Advanced Analysis
  • 相关文献

参考文献18

  • 1Alisa Shevchenko.AOVANCING Malware techniques 2008, Virus Bulletin, Jan 2009, p2-3.
  • 2Kimmo Kasslin, Elia Florio. SPAM FROM THE KERNEL--Trojan.Srizbi, Virus Bulletin, Nov 2007, p5-8.
  • 3Mircea Ciubotariu. WHAT NEXT? TROJAN.LINKOPTIMIZER,Virus Bulletin, Dec 2006, p6-10.
  • 4Ella Florio, Prashant Pathak. RAISING THE BAR: RUSTOCK AND ADVANCES IN ROOTKITS, Virus Bulletin, Sept 2006,p6-9.
  • 5Chandra Prakash. KERNEL MECHANICS OF RUSTOCK, Virus Bulletin, July 2009, p6-14.
  • 6Chandra Prakash.YOUR FILTERS AEE BYPASSED:RUSTOK.C IN THE KEENEL, Virus Bulletin, Nov 2008, 06-11.
  • 7Elia Florio, Kimmo Kasslin. YOUR PC IS NOW STONED! Virus Bulletin, Apt 2008, p4-8.
  • 8Aditya Kapoor and Rachit Mathur.STRIKE ME DOWN, AND I SHALL BECOME MOI?,E POWEI-FUL!, Virus Bulletin, June 2008, p8-10.
  • 9Alisa Shevchenko. CASE STUDY:THE TDSS ROOTKIT, Virus Bulletin, May2009, p10-14.
  • 10Christoph Aline, Micha Pekrul, Dennis Elser. ALL YOUth, MP3S ARE BELONG TO US , Virus Bulletin, Sept 2008, p7-10.

同被引文献19

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部