Computer Engineering and Applications ›› 2008, Vol. 44 ›› Issue (15): 61-64.

• 研发、设计、测试 • Previous Articles     Next Articles

Model checking obfuscated binary malicious code

CHEN Chao,LI Jun,KONG De-guang,SHUAI Jian-mei   

  1. Department of Automation,University of Science & Technology of China,Hefei 230027,China
  • Received:2007-10-18 Revised:2008-01-11 Online:2008-05-21 Published:2008-05-21
  • Contact: CHEN Chao

模型检测迷惑二进制恶意代码

陈 超,李 俊,孔德光,帅建梅   

  1. 中国科学技术大学 自动化系,合肥 230027
  • 通讯作者: 陈 超

Abstract: Introduce model checking method to built model for binary executable,develop a useful model checker.This paper produces a finite state machine,which is used to model a normal malicious binary executable,then make use of model checker to check obfuscated binary executable.If obfuscated binary executable can be identified by finite state machine,this binary executable is malicious executable.The experiment result shows model checking for obfuscated binary executable is an effective static analysis method and can check out some obfuscated binary executable.

Key words: static analysis, model checking, disassembly, malicious code, automata

摘要: 对二进制恶意代码进行形式化建模,开发了一个检查迷惑恶意代码的模型检查器。生成迷惑前的二进制恶意代码的有限状态机模型,再使用模型检查器检测迷惑二进制恶意代码,如果迷惑二进制恶意代码能被有限状态机模型识别,可判定其为恶意代码。实验结果表明模型检查迷惑二进制恶意代码是一种有效的静态分析方法,可以检测出一些常用的迷惑恶意代码。

关键词: 静态分析, 模型检查, 反汇编, 恶意代码, 自动机