期刊文献+

基于模型检测的程序恶意行为识别方法 被引量:5

Program Malicious Behavior Recognizing Method Based on Model Checking
下载PDF
导出
摘要 利用恶意代码所具有的相同或相似的行为特征,提出一种基于模型检测技术的程序恶意行为识别方法。通过对二进制可执行文件进行反汇编,构建程序控制流图,使用Kripke结构对程序建模,利用线性时序逻辑描述典型的恶意行为,采用模型检测器识别程序是否具有恶意行为,并在程序控制流图上对该恶意行为进行标注。实验结果表明,与常用的杀毒软件相比,该方法能更有效地发现程序中的恶意行为。 By using the same or similar behavior characteristics of malicious codes,this paper proposes a method based on model checking technology to recognize malicious behaviors in binary files.It extracts Control Flow Graph(CFG) from disassembled binary executable and builds program model with Kripke structure,then produces Linear Temporal Logic formula to describe malware specification.The model checker recognizes malicious behavior and denotes detected behavior in the CFG.Experimental result shows that compared with common antivirus software,the proposed method is more effectively in recognizing malicious behaviors.
出处 《计算机工程》 CAS CSCD 2012年第18期107-110,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z408 2009AA01Z434) 河南省重大科技攻关计划基金资助项目(092101210500)
关键词 模型检测 恶意行为 线性时序逻辑 控制流图 反汇编 KRIPKE结构 model checking; malicious behavior; Linear Temporal Logic(LTL); Control Flow Graph(CFG); disassemble; Kripke structure
  • 相关文献

参考文献8

  • 1Bergeron J, Debbabi M, Desharnais J, et al. Static Detection of Malicious Code in Executable Programs[C]//Proc. of Symposium on Requirements Engineering for Information Security. Indianapolis, USA: [s. n.], 2001. 被引量:1
  • 2Christodorescu M, Jha S, Seshia S A, et al. Semantics-aware Malware Detection[C]//Proc. of IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 2005: 8-11. 被引量:1
  • 3陈超,李俊,孔德光,帅建梅.模型检测迷惑二进制恶意代码[J].计算机工程与应用,2008,44(15):61-64. 被引量:3
  • 4Schmerl S, Vogel M, K?nig H. Using Model Checking to Identify Errors in Intrusion Detection Signatures[J]. International Journal on Software Tools for Technology Transfer, 2011, 13(1): 89-106. 被引量:1
  • 5何恺铎,顾明,宋晓宇,李力,李江.面向源代码的软件模型检测及其实现[J].计算机科学,2009,36(1):267-272. 被引量:6
  • 6Clarke E M, Grumberg O, Peled D A. Model Checking[M]. Cambridge, USA: MIT Press, 1999. 被引量:1
  • 7Cifuentes C, Emmerik M V. UQBT: Adaptable Binary Translation at Low Cost[J]. Computer, 2000, 33(3): 60-66. 被引量:1
  • 8董威,王戟,齐治昌.并发和实时系统的模型检验技术[J].计算机研究与发展,2001,38(6):698-705. 被引量:9

二级参考文献38

  • 1袁志斌,徐正权,王能超.软件模型检测中的抽象[J].计算机科学,2006,33(7):276-279. 被引量:5
  • 2Idika N,Mathur A P.A survey of malware detection techniques[R]. 2007. 被引量:1
  • 3Preda M D,Christodorescu M.A semantics.based approach to mal- ware detection[C]//POPL' 07, Nice, France, 2007. 被引量:1
  • 4Gryaznov D.Scanners of the year 2000-heuristics[C]//Proceedings of the 5th International Virus Bulletin, 1999. 被引量:1
  • 5Sung A,Xu J,Chavez P,et al.Static analyzer of vicious executables (save)[C]//Proceedings of the 20th Annual Computer Security. Applications Conference( ACSAC'04), 2004 : 326-334. 被引量:1
  • 6Karim M E,Walenstein A,Lakhotia A,et al.Malware phylogeny generation using permutations of code[J].Journal in Computer Virology, 2005. 被引量:1
  • 7Chen H,Wagner D,MOPS:an infrastructure for examining security properties of software[C]//Proc 9th ACM Conf.Computer and Communications Security(CCS2002).USA:ACM Press,2002:235-244. 被引量:1
  • 8IDAPro disassembler[EB/OL]. ( 2006 ).http ://www.datarescue.com/idabase. 被引量:1
  • 9Brumley D,Newsome J.Alias analysis for assembly Technical Report[R].USA:Sehool of Computer Seience,Carnegie Mellon University, 2006. 被引量:1
  • 10Micallef S.IDA plug-in writting in C\C++[EB/OL].(2005-10-08). http ://www.binary pod.com. 被引量:1

共引文献15

同被引文献28

  • 1刘晖.基于虚拟机的网格计算模型[J].科学技术与工程,2005,5(16):1209-1211. 被引量:1
  • 2Sebastian Schrittwieser,Stefan Katzenbeisser.Code Obfuscation against Static and Dynamic Reverse Engineering[C]//Proceedings of the 13th international conference on information hiding,Vienna,Springer-Verlag Press,2011:270-284. 被引量:1
  • 3Konrad Rieck,Philipp Trinius,Carsten Willems.Automatic analysis of malware behavior using machine learning[J].Journal of Computer Security,2011,19(4):639-668. 被引量:1
  • 4Christodorescu M,Jha S,Seshia SA,et al.Semantics-Aware malware detection[C]//Proceedings of the 2005 IEEE Symposium on Security and Privacy,Washington,DC,USA,Springer-Verlag Press,2005:32-46. 被引量:1
  • 5Younghee Park,Douglas Reeves,Vikram Mulukutla.Fast malware classification by automated behavioral graph matching[C]//Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research.New York,NY,USA,ACM Press,2010:Artical No.45. 被引量:1
  • 6Martina Lindorfer,Clemens Kolbitsch,Paolo Milani Comparetti.Detecting Environment-Sensitive Malware[C]//Proceedings of the 14th International Symposium RAID,Menlo Park,CA,USA,SpringerVerlag Press,2011:338-357. 被引量:1
  • 7Kinder J,Katzenbeisser S,Schallhart C,et al.Detecting malicious code by model checking[C]//Proceedings of the Second International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment.Vienna:Springer-Verlag Press,2005:174-187. 被引量:1
  • 8Kang M G,McC amant S,Poosankam P,et al.DTA++:Dynamic taint analysis with targeted control-flow propagation[C]//Proceedings of the 18th Annual Network and Distributed System Security Symposium,San Diego,California,USA,2011. 被引量:1
  • 9Clarke E,Grumberg O,Peled D.Model Checking[M].London,MIT Press,2000:129-134. 被引量:1
  • 10Bellard F.QEMU,a Fast and Portable Dynamic Translator[C]//Proceedings of the annual conference on USENIX Annual Technical Conference,Berkeley,CA,USA,USENIX Association Press,2005:41-46. 被引量:1

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部