期刊文献+

逆向分析在电子数据取证中的应用——以“QQ密码大划拉”为例 被引量:5

The Application of Reverse Analysis in Digital Evidence Investigation ——Taking the "QQ Passwords Collecting" Malware for Example
在线阅读 下载PDF
导出
摘要 逆向分析是恶意程序取证的常用方法之一,在揭示恶意程序意图及行为方面发挥着其他方法无法比拟的作用。在对逆向分析基本概念、方法、工具进行介绍的基础上,结合中国大陆地区一起利用恶意程序窃取QQ账号与密码的真实案例,从查壳、脱壳、断点设置、程序跟踪、关键信息获取等方面详细描述了针对恶意程序进行逆向分析的全过程。 The reverse analysis process is an advanced and efficient method that exposes the intention and process of malwares.This paper introduces the basic concepts,methods,and tools of the reverse analysis process.A case study of a malware in China,which was used to obtain QQ accounts and passwords,is presented to illustrate the whole process of the reverse analysis process of malware from the aspects of checking pack,unpacking,breakpoint setting,program tracing,key information acquiring and other facets.
作者 罗文华
出处 《中国司法鉴定》 北大核心 2011年第6期54-58,共5页 Chinese Journal of Forensic Sciences
关键词 恶意程序 逆向分析 QQ密码大划拉 启动函数 WINDOWS API malware reverse analysis QQ passwords collecting pack start function Windows API
  • 相关文献

参考文献2

二级参考文献6

  • 1Peter Lyman, Hal R Varian. How Much Information 2003 [EB/ O L]. http ://www2.sims.berkeley.edu/research/proj ects/how-much-info ( 2003 - 10-27 ) [2009-12-10].
  • 2Scott Ferguson, Keith Gittings, Casey Lunny. A Forensic E- valuation of ANT System[J]. FALL 2002, CS 585 F.
  • 3Organization on Digital Evidence (IOCE) 2000.Digital Evi- dence: Standards and Principles[J].Forensic Science Commu- nications, April 2000, 2(2).
  • 4NIJ Special Report. Forensic Examination of Digital Evidence: A Guide for Law Enforcement[M]. National Institute of Justice, Washington D.C.1994.
  • 5金波,陶明明.计算机取证关键技术研究[C].第二十一届全国计算机安全技术交流会论文集.2006:7.
  • 6王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:199

共引文献17

同被引文献21

  • 1徐家力.计算机软件知识产权保护所面临的挑战及对策[J].信息网络安全,2006(2):22-25. 被引量:9
  • 2P.Cousot,R.Cousot. Abstract interpretation:a unified lattice model for static analysis of programs by comtruction or approximation of fixpoints[A].New York:ACM Press,1977.238-252.
  • 3S.Bardin,P.Herrmann,J.Leroux,O.Ly,R.Tabary. The bincoa framework for binary code analysis[A].2011.165-170.
  • 4Serge Chaumette,Olivier Ly,Renaud Tabary. Automated Extraction of Polymorphic Virus Signatures using Abstract Interpretation[A].2011.41-48.
  • 5Avira. (2004) W32/bolzano virus[EB/OL].http://www.avira.com/fr/support-threats-summary/tid/6061/threat/W32.Bolzano.5396,2011.
  • 6Sni Ashkan,Yadegari Babak. Malware detection b0.ed on minhlg API calls[A].2010.1020-1025.
  • 7Hart Kyotmg Soo,K,zaag Boojoong. Malware cla.sificafion using instruction frequencies[A].2011.298-29X.
  • 8Anju S.S,Harmya P. Malware detection using assembly code and control flow graph optimization[A].2010.
  • 9Sean Peisert,Matt Bishop. Analysis of Computer Intrusiors Using Sequenc of Function Calls[J].IF F F TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,.
  • 10向大为,麦永浩.“熊猫烧香”案件的分析鉴定[J].警察技术,2009(1):32-35. 被引量:6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部