针对恶意代码的连续内存镜像分析方法  被引量:3

Successive memory image analysis method for malicious codes

在线阅读下载全文

作  者:李伟明[1] 邹德清[1] 孙国忠 LI Wei-ming ZOU De-qing SUN Guo-zhong(School of Computer Science, Huazhong University of Science and Technology, Wuhan 430074, China Dawning Information Industry Co., Ltd., Beijing 100080, China)

机构地区:[1]华中科技大学计算机学院,湖北武汉430074 [2]曙光信息产业有限公司,北京100080

出  处:《网络与信息安全学报》2017年第2期20-30,共11页Chinese Journal of Network and Information Security

基  金:国家自然科学基金资助项目(No.61272072);国家重点基础研究与发展计划基金资助项目("973"计划)(No.2016YFB0200300)~~

摘  要:为了更加全面地检测恶意代码的行为,提出连续内存镜像分析技术。核心是在QEMU虚拟机中运行恶意代码样本,获取样本运行时期连续增量的内存镜像,然后按照时序解析为多个完整的内存镜像。在单个内存镜像分析的基础上,对不同时刻内存镜像做对比分析。同时设计运用可视化工具D3.js,以图表的形式直观动态地展示系统运行过程中内存状态的变化。最后实现原型系统,通过对40种恶意代码样本进行测试,检测出的恶意代码行为数量在传统单镜像内存分析的基础上增加了19.7%。In order to detect the behavior of malicious code more comprehensively, the technology of continuous memory image analysis was proposed. The core idea was to run malicious code in QEMU virtual machine, to obtain the memory image of the continuous increment in the running period, and then to analyze the memory image of the base and increment as the memory image. On the basis of the analysis of a single memory image, different memory images were analysised comparatively. At the same time, the visualization tool D3.js was used to visually display the change of the memory state in the process of system operation. Finally, the prototype system was tested by 40 kinds of malicious code samples, and the number of malicious code behavior was increased by 19.7% than traditional single memory image.

关 键 词:恶意代码 内存镜像 对比分析 数据可视化 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象