期刊文献+

基于控制流分析的隐藏代码动态捕获方法

Dynamic Capture Method for Hidden Code Based on Control Flow Analysis
在线阅读 下载PDF
导出
摘要 为获取并分析采用加壳、控制流混淆技术所产生的隐藏代码,提出一种新的隐藏代码动态捕获方法。利用静态控制流分析算法提取动态捕获点,采用动态二进制插桩技术插入监控代码,在程序的执行过程中实现隐藏代码的执行前分析。实验结果证明,该方法能够减少程序插桩点,有效获取并分析可执行程序中的隐藏代码。 In order to capture and analyze the hidden code produced by shell and control flow obfuscation techniques,this paper proposes a dynamic capture method based on control flow analysis to analyze hidden code.By extracting dynamic capture points with control flow analysis,and inserting monitoring code with dynamic binary instrumentation,it can implement the pre-execution analysis for hidden code.Experimental results show that the method can reduce the number of instrumented program locations,and capture the hidden code for analyzing effectively.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第21期23-25,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2007AA01Z483) 河南省高新领域重点攻关计划基金资助项目(082102210011)
关键词 隐藏代码 动态捕获 控制流分析 动态二进制插桩 执行前分析 hidden code dynamic capture control flow analysis dynamic binary instrumentation pre-execution analysis
  • 相关文献

参考文献6

  • 1Bania E Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs[EB/OL]. [2010-11-22]. http://piotrbania. corrdall/articl es/pbania-dbi-unpacking2009.pdf.
  • 2Balakrishnan G, Reps T. Analyzing Memory Accesses in x86 Executables[C]//Proc. of" 2004 International Conference on Compiler Construction. New'York, USA: [s. n.], 2004.
  • 3Roundy K A, Miller B E Hybrid Analysis and Control of Malware Binaries[EB/OL]. [2010-11,12]. ftp://ftp.cs.wisc.edu/paradyn/ papers/Roundy 10Malware.pdf.
  • 4Theiling H. Extracting Safe and Precise Control Flow from Binaries[C]//Proc. of 2000 Conference on Real-time Computing Systems and Applications. Cheju Island, South Korea: [s. n.], 2000.
  • 5Buck B, Hollingsworth J K. An API for Runtime Code Patching[J]. The International Journal of High Performance Computing Applications, 2000, 14(4): 317-329.
  • 6岳峰,庞建民,赵荣彩,白莉莉.反汇编过程中call指令后混淆数据的识别[J].计算机工程,2010,36(7):144-146. 被引量:3

二级参考文献5

  • 1Kruegel C, Robertson W, Valeur F, et al. Static Disassembly of Obfuscated Binaries[D]. California, USA: University of California Santa Barbara, 2004.
  • 2Linn C, Debray S. Obfuscation of Executable Code to Improve Resistance to Static Disassembly[C]//Proc. of the 10th ACM Conference on Computer and Communications Security. Washington D. C., USA: [s. n.], 2003: 290-299.
  • 3Eilam E. Reversing: Secrets of Reverse Engineering[M]. [S. l.]: Wiley Publishing, Inc., 2005.
  • 4Lakhotia A, Kumar E U, Venable M. A Method for Detecting Obfuscated Calls in Malicious Binaries[J]. IEEE Transactions on Software Engineering, 2005, 31(11): 955-967.
  • 5Udupa S K, Debray S K, Madou M. Deobfuscation: Reverse Engineering Obfuscated Code[C]//Proc. of the 12th Working Conference on Reverse Engineering. Washington D. C., USA: IEEE Computer Society, 2005: 45-54.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部