[1]张登银 赵晓强.基于M序列的恶意代码分片插入机制[J].计算机技术与发展,2010,(10):194-197.
 ZHANG Deng-yin,ZHAO Xiao-qiang.Malicious Code Splitted and Inserted Based on M Sequence[J].,2010,(10):194-197.
点击复制

基于M序列的恶意代码分片插入机制()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年10期
页码:
194-197
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Malicious Code Splitted and Inserted Based on M Sequence
文章编号:
1673-629X(2010)10-0194-04
作者:
张登银 赵晓强
南京邮电大学计算机学院
Author(s):
ZHANG Deng-yinZHAO Xiao-qiang
College of Computer,Nanjing University of Posts and Telecommunications
关键词:
恶意代码模糊变换分片插入M序列
Keywords:
malicious code obfuscating transformation splitting and inserting M sequence
分类号:
TP309
文献标志码:
A
摘要:
恶意代码的生存周期包括恶意代码的产生、传播、隐藏和破坏。其中,隐藏是恶意代码生存周期中极其重要的一环。研究恶意代码的隐藏技术,了解隐藏技术的原理和关键技术,才能更好地防御恶意代码的攻击。目前,恶意代码的深层隐藏与检测技术已经成为当前计算机安全领域的一个研究热点。为了更深入地研究恶意代码,首先分析恶意代码的模糊变换和分片插入技术,然后利用M序列的随机性和状态遍历特性,提出了一种基于M序列的恶意代码分片插入机制。实验证明该机制能够有效提高恶意代码的随机性和抗分析能力
Abstract:
The life cycle of the malicious code includes generation,transmission,hidden and disrupt.Among there,hidden is extremely important in the life cycle.In order to prevent the attack of malicious code,the principle and key technology of the hiding technology must be researched.Now,the deep hiding and detecting technology of malicious code has already become one of the research hotspots in the field of computer security.In order to have a deep study on the malicious code,firstly introduces the technology of splitting and inserting and the technology of obfuscating transformation for malicious code.Then basic the randomicity and all condition reached characteristics of M sequence,a technology of splitting and inserting based on M sequence is proposed.Test showed this method can improve the randomicity and anti-analyze ability of malicious code

相似文献/References:

[1]桂佳平 周雍恺 沈俊 蔡继文 刘功申.基于智能手机恶意代码防范模型的研究[J].计算机技术与发展,2010,(01):159.
 GUI Jia-ping,ZHOU Yong-kai,SHEN Jun,et al.Research on Prevention Model of Malicious Code in Smart Phone[J].,2010,(10):159.
[2]左黎明.Windows内核恶意代码分析与检测技术研究[J].计算机技术与发展,2008,(09):145.
 ZUO Li-ming.Research of Analysis and Detection of Malicious Code in Windows Kernel[J].,2008,(10):145.
[3]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(10):128.
[4]秦军,张海鹏,苏志和,等.一种基于二维行为特征的恶意代码识别方法[J].计算机技术与发展,2013,(06):143.
 QIN Jun[],ZHANG Hai-peng[],SU Zhi-he[],et al.A Malicious Code Detection Method Based on Two-dimensional Behavior Characterization[J].,2013,(10):143.
[5]赵云程,慕德俊,戴航.双重恶意代码检测系统的设计与实现[J].计算机技术与发展,2013,(10):111.
 ZHAO Yun-cheng,MU De-jun,DAI Hang.Design and Implementation of Dual Malware Detection System[J].,2013,(10):111.
[6]丁 应,李 琳.一种基于特征编码技术的恶意代码检测方法[J].计算机技术与发展,2021,31(01):131.[doi:10. 3969 / j. issn. 1673-629X. 2021. 01. 024]
 DING Ying,LI Lin.A Method for Detecting Malicious Code Based onFeature Encoding Technology[J].,2021,31(10):131.[doi:10. 3969 / j. issn. 1673-629X. 2021. 01. 024]

备注/Memo

备注/Memo:
国家863计划(2007AA701302,2009AA701202)张登银(1964-),男,江苏靖江人,研究员,博士,CCF会员,研究方向为信号处理、信息安全
更新日期/Last Update: 1900-01-01