计算机工程与应用 ›› 2008, Vol. 44 ›› Issue (15): 61-64.

• 研发、设计、测试 • 上一篇    下一篇

模型检测迷惑二进制恶意代码

陈 超,李 俊,孔德光,帅建梅   

  1. 中国科学技术大学 自动化系,合肥 230027
  • 收稿日期:2007-10-18 修回日期:2008-01-11 出版日期:2008-05-21 发布日期:2008-05-21
  • 通讯作者: 陈 超

Model checking obfuscated binary malicious code

CHEN Chao,LI Jun,KONG De-guang,SHUAI Jian-mei   

  1. Department of Automation,University of Science & Technology of China,Hefei 230027,China
  • Received:2007-10-18 Revised:2008-01-11 Online:2008-05-21 Published:2008-05-21
  • Contact: CHEN Chao

摘要: 对二进制恶意代码进行形式化建模,开发了一个检查迷惑恶意代码的模型检查器。生成迷惑前的二进制恶意代码的有限状态机模型,再使用模型检查器检测迷惑二进制恶意代码,如果迷惑二进制恶意代码能被有限状态机模型识别,可判定其为恶意代码。实验结果表明模型检查迷惑二进制恶意代码是一种有效的静态分析方法,可以检测出一些常用的迷惑恶意代码。

关键词: 静态分析, 模型检查, 反汇编, 恶意代码, 自动机

Abstract: Introduce model checking method to built model for binary executable,develop a useful model checker.This paper produces a finite state machine,which is used to model a normal malicious binary executable,then make use of model checker to check obfuscated binary executable.If obfuscated binary executable can be identified by finite state machine,this binary executable is malicious executable.The experiment result shows model checking for obfuscated binary executable is an effective static analysis method and can check out some obfuscated binary executable.

Key words: static analysis, model checking, disassembly, malicious code, automata