期刊文献+

基于对象语义的恶意代码检测方法 被引量:2

Object-semantics based malware detection method
在线阅读 下载PDF
导出
摘要 恶意代码变种给信息系统安全造成了巨大威胁,为有效检测变种恶意代码,通过动态监控、解析系统调用及参数,将不同对象操作关联到同一对象,构建对象状态变迁图,然后对状态变迁图进行抗混淆处理,获取具有一定抗干扰性的恶意代码行为特征图。最后,基于该特征图检测未知代码。实验结果表明,该方法能够有效抵抗恶意代码重排、垃圾系统调用等混淆技术干扰,而且误报率低,在检测变种恶意代码时具有较好的效果。 Malware variants make a big threat to security of information system. To detect variants of malicious codes effec- tively, through dynamic monitoring and parsing system calls and parameters, this paper related different object operations to the same object, and constructed the object state changing graph. Then it processed the object state changing graph by an anti-ob- fuscation method to acquire the anti-interference behavior signatures graph of malware. Finally, it detected unknown codes based on the behavior signatures graph. As the results of the experiments show, the method can effectively resist the inference like the rearrangement of malicious codes and the inserting of useless system call. It has a low false negative rate in detecting normal programs and has a good result in detecting variants of malicious codes.
作者 任李 潘晓中
出处 《计算机应用研究》 CSCD 北大核心 2013年第10期3106-3109,3113,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61272492 61103231 61103230)
关键词 恶意代码检测 系统对象 抗混淆 语义 状态变迁图 malware detection system object anti-obfuscation semantics state changing graph
  • 相关文献

参考文献11

二级参考文献60

共引文献126

同被引文献17

  • 1CNCERT.2013年中国互联网网络安全报告[EB/OL].(2014-06-03) [ 2014-07-01 ]. http ://www. cert. org. cn/publish/main/46/ 2014/20140603151551324380013/20140603151551324380013. html.
  • 2Preda M D, Christodorescu M, Jha S, et al. A semantics-based ap- proach to malware detection [ J ]. ACM SIGPI..AN Notices, 2007, 42( 1 ) :377-388.
  • 3Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection [ C ]//Proc of the 23rd Annual Conference on Computer Se- curity Applications Conference. 2007: 421-430.
  • 4Honeynet Project. Dionaea catches bugs[ EB/OL]. (2014) [2014 - 09-13 ]. http ://dionaea. carnivore, it/.
  • 5Gerogios P, Herbert B. Argos:an emulator for capturing zero-day at- tacks[ EB/OL]. (2014-01-20) [2014-09-13 ]. http://www, few. vu. nl/ argos/.
  • 6Leita C, Bayer U, Kirda E. Exploiting diverse observation perspec- tives to get insights on the malware landscape[ C ]//Proc of IEEE/IF- IP International Conference on Dependable Systems and Networks. IS. 1. ] :IEEE Press, 2010: 393-402. 360.
  • 7Lab. Malware defender[ EB/OL]. (2014) [2014-09-13 ]. ht- tp://labs. 360. cn/rnalwaredefender.
  • 8Gupta D, Mehte B M. Forensics analysis of sandboxie artifacts [ C]//Proc of SSCC. 2013 : 341-352.
  • 9Song D, Brumley D, Yin H, et al. BitBlaze : binary analysis for com- puter security[ EB/OL ]. (2014) [ 2014- 09- 13 ]. http ://bitblaze. cs. berkeley, edu/.
  • 10Moser A, Kruegel C, Kirda E. Exploring muhiple execution paths ibr malware analysis[ C]//Proc of IEEE Symposium on Security and Pri- vacy. 2007:231-245.

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部