期刊文献+

基于混合分析的自动化脱壳技术研究

Research on Automatic Unpacking Technology Based on Hybrid Analysis
下载PDF
导出
摘要 针对当前对恶意代码自动化脱壳的研究不够充分的问题,在恶意代码静态分析和动态分析的基础上,提出基于混合分析的动态高效自动化脱壳方法。通过将动态二进制插桩与静态墒值计算相结合的混合分析方法,解决恶意代码脱壳过程中的OEP定位和导入表修复问题,提出基于混合分析的入口点OEP定位方法和基于静态指令流跟踪的导入表修复方法。最后,测试结果验证了该脱壳方法的有效性和通用性。 At present,the research on automatic unpacking of malicious code is not enough.Aiming at this problem,based on the static analysis and dynamic analysis of malicious code,this paper proposes a dynamic and efficient automatic unpacking method based on hybrid analysis.A hybrid analysis method,which combines dynamic binary instrumentation and static entropy calculation,is proposed to solve the problem of OEP location and import table repair in the process of malicious code unpacking.A hybrid analysis based on entry point OEP location method and a static instruction flow tracking based on import table repair method are proposed.Finally,the test results verify the effectiveness and generality of the method.
作者 徐旭 XU Xu(State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China)
出处 《信息工程大学学报》 2020年第1期55-60,67,共7页 Journal of Information Engineering University
关键词 混合分析 脱壳 OEP定位 导入表修复 hybrid analysis unpacking OEP location import table repair
  • 相关文献

参考文献5

二级参考文献29

  • 1曾勇军,朱俊虎,奚琪.程序自动脱壳数据采集技术研究[J].计算机应用,2009,29(3):813-816. 被引量:3
  • 2Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis [ C ]//Proceedings of the IEEE Sympo- sium on security and Privacy. 2007: 231-245. 被引量:1
  • 3Xie T, Tillmann N, De Halleux J, et al. Fitness-guided path exPloration in dynamic symbolic execution[ R]. Microsoft: MSR-TR-2008-123,2008. 被引量:1
  • 4Boonstoppel P, Cadar C, Engler D. RWset: Attacking path explosion in constraint-based test generation[ C ]//Tools and Algo- rithms for the Construction and Analysis of Systems. 2008 : 351-366. 被引量:1
  • 5Staats M, Pasareanu C. Parallel symbolic execution for structural test generation[ C ]//Proceedings of the 19th international symposium on Software testing and analysis(ISSTA 10). 2010 : 183-194. 被引量:1
  • 6Kim M, Kim Y, Rothermel G. A scalable distributed concolic testing approach: An empirical evaluation[ C ]//Software Tes- ting, Verification and Validation (ICST) , 2012 IEEE Fifth International Conference on. 2012: 340-349. 被引量:1
  • 7Ilfak Guilfanov. IDA fast library identification and recognition technology (FLIRT Technology) : In-depth[ EB/OL]. (2012- 02-27). [2013-03-11 ]. http://www. hex-rays. com/products/ida/tech/flirt/in_depth. shtml. 被引量:1
  • 8Dechter R. Constraint Processing[ M ]. San Francisco:Morgan Kaufmann Publishers,2003. 被引量:1
  • 9A pt K. Principles of Constraint Programming[ M ]. Cambridge:Cambridge University Press,2003. 被引量:1
  • 10Michael S, Adam G, Pedram A. Fuzzing:brute force vulnerability discovery[ M]. Addison-Wesley Professional, 2007. 被引量:1

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部