首页> 外文会议>Information Security for South Africa Conference >Towards a sandbox for the deobfuscation and dissection of PHP malware
【24h】

Towards a sandbox for the deobfuscation and dissection of PHP malware

机译:走向沙盒,用于对PHP恶意软件进行混淆和解剖

获取原文

摘要

The creation and proliferation of PHP-based Remote Access Trojans (or web shells) used in both the compromise and post exploitation of web platforms has fuelled research into automated methods of dissecting and analysing these shells. Current malware tools disguise themselves by making use of obfuscation techniques designed to frustrate any efforts to dissect or reverse engineer the code. Advanced code engineering can even cause malware to behave differently if it detects that it is not running on the system for which it was originally targeted. To combat these defensive techniques, this paper presents a sandbox-based environment that aims to accurately mimic a vulnerable host and is capable of semi-automatic semantic dissection and syntactic deobfuscation of PHP code.
机译:基于PHP的远程访问特洛伊木马(或Web外壳)的创建和扩散,在Web平台的入侵和后期开发中均使用,这推动了对剖析和分析这些外壳的自动化方法的研究。当前的恶意软件工具通过使用迷惑技术来伪装自己,这些迷惑技术旨在挫败对代码进行剖析或反向工程的任何努力。如果高级代码工程检测到恶意软件未在其最初针对的系统上运行,则甚至可能导致恶意软件的行为有所不同。为了对抗这些防御技术,本文提出了一种基于沙箱的环境,旨在准确模拟易受攻击的主机,并且能够对PHP代码进行半自动的语义剖析和语法去混淆。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号