【24h】

Static CFG Analyzer for Metamorphic Malware Code

机译:用于变形恶意软件代码的静态CFG分析器

获取原文

摘要

Malware detection and prevention methods are increasingly becoming important particularly for all computer systems connected to Internet. The term 'Malware' is collectively used for viruses, worms, Trojan's etc. Malicious activities of malware is to steal, modify, leak the data to external server or consuming system resources thereby degrading the performance of system. To avoid detection, malicious code(s) generates multiple variants while they propagate. In past, researchers have addressed malware detection using Control Flow Graph (CFG). These detection methods were based on comparison of shapes of CFG's of original sample with that of variants.The proposed approach compares instructions at basic block of original malware with that of the variants using longest common subsequence (LCS). Some viruses and benign programs have been used in the test set. Preliminary results are promising to prove the effectiveness of our proposed methodology.
机译:恶意软件检测和预防方法变得越来越重要,尤其是对于连接到Internet的所有计算机系统。 “恶意软件”一词​​统称为病毒,蠕虫,特洛伊木马等。恶意软件的恶意活动是窃取,修改数据,将数据泄漏到外部服务器或消耗系统资源,从而降低了系统性能。为了避免检测,恶意代码在传播时会生成多个变体。过去,研究人员已经使用控制流图(CFG)解决了恶意软件检测问题。这些检测方法基于原始样品的CFG形状与变体的CFG形状的比较。 拟议的方法使用最长的公共子序列(LCS)将原始恶意软件的基本代码块与变体的代码进行比较。测试集中使用了一些病毒和良性程序。初步结果有望证明我们提出的方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号