...
首页> 外文期刊>Journal of Parallel and Distributed Computing >Evaluating model checking for cyber threats code obfuscation identification
【24h】

Evaluating model checking for cyber threats code obfuscation identification

机译:评估模型检查以进行网络威胁代码混淆识别

获取原文
获取原文并翻译 | 示例
           

摘要

Code obfuscation is a set of transformations that make code programs harder to understand. The goal of code obfuscation is to make reverse engineering of programs infeasible, while maintaining the logic on the program. Originally, it has been used to protect intellectual property. However, recently code obfuscation has been also used by malware writers in order to make cyber threats easily able to evade antimalware scanners. As a matter of fact, metamorphic and polymorphic viruses exhibit the ability to obfuscate their code as they propagate. In this paper we propose a model checking-based approach which is able to identify the most widespread obfuscating techniques, without making any assumptions about the nature of the obfuscations used. We evaluate the proposed method on a real-world data set obtaining an accuracy equal to 0.9 in the identification of obfuscation techniques. (C) 2018 Elsevier Inc. All rights reserved.
机译:代码混淆是使代码程序难以理解的一组转换。代码混淆的目的是使程序的逆向工程不可行,同时保持程序上的逻辑。最初,它已用于保护知识产权。但是,最近,恶意软件编写者还使用了代码混淆功能,目的是使网络威胁能够轻松逃避反恶意软件扫描程序。实际上,变态和多态病毒在传播时表现出能够模糊其代码的能力。在本文中,我们提出了一种基于模型检查的方法,该方法能够识别最广泛的混淆技术,而无需对所使用混淆的性质进行任何假设。我们在真实世界的数据集上评估提出的方法,该方法在识别混淆技术中获得的精确度等于0.9。 (C)2018 Elsevier Inc.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号