- 1、本文档共21页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Static Analysis of Executables to Detect Malicious Patterns
Published on 10 February 2003 as Technical Report # 1467 at the Com-
puter Sciences Department of the University of Wisconsin, M adison, US.
Static Analysis of Executables to Detect Malicious Patterns
Mihai Christodorescu and Somesh Jha
fmihai,jhag@
10 February 2003
Abstract
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique
viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game
between malicious code writers and researchers working on m alicious code detection. Malicious code writers attempt
to obfuscate the malicious code to subvert the malicious code detectors, such as anti-virus software. We tested the
resilience of three commercial virus scanners against code obfuscation attacks. The results were surprising: the three
commercial virus scanners could be subverted by very simple obfuscation transformations! We present an architecture
for detecting malicious patterns in executables that is resilient to common obfuscation transformations. Experimental
results demonstrate the efficacy of our prototype tool, SAFE (a static analyzer for executables).
1 Introduction
In the interconnected world of computers, malicious code has become an omnipresent and dangerous threat. Malicious
code can infiltrate hosts using a variety of methods such as attacks against known software flaws, hidden functionality
in regular programs, and social engineering. Given the devastating effect malicious code has on our cyber infrastruc-
ture, identifying malicious programs is an important goal. Detecting the presence of malicious
您可能关注的文档
- Quantum Gravity and Matter Counting Graphs on Causal Dynamical Triangulations.pdf
- Quantum Mechanical Search and Harmonic Perturbation.pdf
- Quantum Search for Zeros of Polynomials.pdf
- Quantum Separability and Entanglement Detection via EntanglementWitness Search and Global.pdf
- Quantum Squeezing Effects of a Nondissipative Mesoscopic Circuit with Coupled Inductors an.pdf
- Quantum versus Semiclassical Description of Selftrapping Anharmonic Effects.pdf
- Quantum Mechanics and Discrete Time from Timeless Classical Dynamics.pdf
- Quartus II Software Design Series.doc
- Quaternion Dynamics of the Brain.pdf
- Quaternion Analysis for Generalized Electromagnetic Fields of Dyons in Isotropic Medium.pdf
最近下载
- 栏杆工程施工组织设计(技术标).doc
- 2024北京一零一中初二(下)期中物理及答案.docx
- 跨学科实践活动09+探究土壤酸碱性对植物生长的影响(教学课件)-2024-2025学年九年级化学跨学科实践活动教学课件+设计(人教版2024).pptx VIP
- 2024年山东省滨州市中考化学试题附解析答案.pptx VIP
- 违反中央八项规定精神清单80条PPT深入贯彻中央八项规定精神.pptx VIP
- 外研社新一代大学英语(基础篇)综合教程B2U4 iExplore 2.pptx VIP
- 3-哈利波特与阿兹卡班的囚徒 中英对白剧本.pdf VIP
- 2024年社区工作者考试必背1000题题库及答案.docx VIP
- 计算小达人3年级数学下册人教版.pptx
- 初始过程能力研究计划.xls VIP
文档评论(0)