J4 ›› 2014, Vol. 36 ›› Issue (03): 481-486.
• 论文 • 上一篇 下一篇
刘星,唐勇
收稿日期:
修回日期:
出版日期:
发布日期:
基金资助:
国家自然科学基金资助项目(61003303)
LIU Xing,TANG Yong
Received:
Revised:
Online:
Published:
摘要:
恶意代码的相似性分析是当前恶意代码自动分析的重要部分。提出了一种基于函数调用图的恶意代码相似性分析方法,通过函数调用图的相似性距离SDMFG来度量两个恶意代码函数调用图的相似性,进而分析得到恶意代码的相似性,提高了恶意代码相似性分析的准确性,为恶意代码的同源及演化特性分析研究与恶意代码的检测和防范提供了有力支持。
关键词: 恶意代码, 函数调用图, 图的相似性距离, 指令序列, 最大权匹配
Abstract:
The similarity analysis of malware is an important part of the current automatic analysis of malware. The paper proposes a new method of similarity analysis of malware based on functioncall graphs. This method uses the similarity distance of malware’s function-call graphs (called SDMFG) to measure the similarity of two malwares’ function-call graphs, and then analyzes the similarity of the two malwares. This method improves the accuracy of similarity analysis of malware, providing a strong support for analysis of the homology and evolution characteristics of malware and malware detection and prevention.Key words:
Key words: malware;function-call graph;SDMFG;instruction sequence;max-weight matching
刘星,唐勇. 恶意代码的函数调用图相似性分析[J]. J4, 2014, 36(03): 481-486.
LIU Xing,TANG Yong. Similarity analysis of malware’s function-call graphs [J]. J4, 2014, 36(03): 481-486.
0 / / 推荐
导出引用管理器 EndNote|Ris|BibTeX
链接本文: http://joces.nudt.edu.cn/CN/
http://joces.nudt.edu.cn/CN/Y2014/V36/I03/481