Local entropy-based visualized analysis method for malicious codes
A malicious code and analysis method technology, applied in the direction of computer parts, instruments, platform integrity maintenance, etc., can solve the problems of inability to meet the classification premise, accurate positioning of the comparison range, incomplete features, etc., to reduce the difficulty and achieve accurate classification and judgment. , the comprehensive effect of classification features
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] A method for visual analysis of malicious code based on local entropy, specifically:
[0029] Step 1: Same as the entropy map method proposed by KyongSoo Han et al., the present invention also needs to calculate the entropy value of every 256-byte block in the malicious code. The difference is that in order to generate a local entropy square diagram in the subsequent steps, the present invention needs to fill in 0 entropy values after the generated entropy value sequence, so that the length of the final entropy value sequence can be square rooted. Take Trojan-Downloader.Win32.QQHelper sample .gfk as an example, the size of the malicious code file is 636471 bytes, the entropy sequence is 1.23619305365, 0.730780826873, 3.61392762918, ..., the length is 2487, add 13 0 entropy values, add The back length is 2500;
[0030] Step 2: Calculate the djb2 hash value of each entropy value in characters from the entropy value sequence obtained in the previous step, and its decima...
Embodiment 2
[0036] Adopt the malicious code visual analysis method based on local entropy described in embodiment 1, generate the image of Trojan-Spy.Win32.WinSpy class sample .fq, .ou, .tz, as Figure 3-5 As shown, when the present invention analyzes the malicious samples of the same family, it can discover the subtle differences among them through the local entropy square diagram, which provides a basis for grasping the development and change trend of the variants of the same family.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com