Malicious code confusion detection method and system, computer device, and medium

A malicious code and detection method technology, applied in the field of computer software, can solve problems such as single detection technology, difficulty in accurately analyzing malicious code, obfuscation and anti-detection capability, and unreasonable detection.

Inactive Publication Date: 2018-12-11
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Code obfuscation is one of the main means for malicious code to hide itself. At present, there are mainly the following problems in the anti-detection and analysis technology of malicious code: the detection technology is relatively single, and it is difficult to accurately analyze the anti-detection ability of malicious code obfuscation
Traditional malicious code obfuscation and anti-detection analysis is mainly based on the dynamic running effect of malicious code or the actual debugging status. Such tests have many situations such as environment preparation and status analysis, which will lead to low detection efficiency and long detection time
Malicious code obfuscation and anti-detection capabilities are often not composed of a single technology. For example, its anti-virtual machine technology has multiple implementation methods, but there is no conflict between the implementation technologies. If the traditional status evaluation is used, the evaluation results are useful for the current environment. a lot of dependence
Traditional malicious code obfuscation detection technology only detects one of the functions, such as abnormal return, etc. Anti-malicious code obfuscation detection requires multiple evaluations and analysis, and it is unreasonable and incomplete to detect only one aspect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code confusion detection method and system, computer device, and medium
  • Malicious code confusion detection method and system, computer device, and medium
  • Malicious code confusion detection method and system, computer device, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0071] Please refer to figure 1 , figure 1 It is a flowchart of a malicious code obfuscation detection method provided by a specific embodiment of the present invention.

[0072] In a specific implementation manner of the present invention, the embodiment of the present invention provides a malicious code obfuscation detection method, including:

[0073] S11: Obtain the code to be detected;

[0074] S12: Perform any combination of two or more of entry point...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious code confusion detection method, which comprises the following steps: obtaining a code to be detected; enabling the code to be detected to be subjected to a combination of any two of entrance point confusion detection, call instruction post-confusion data detection, subroutine return address modification detection, and conditional jump confusion detection. The invention generalizes the malicious code obfuscation detection method, obtains the common malicious code obfuscation actual situation, and according to the actual situation, formulates the concrete method aiming at various malicious code obfuscation situations, and carries on more comprehensive detection to the malicious code, thereby providing more comprehensive malicious code detection identification information. The invention provides a malicious code confusion detection system, a computer device and a medium, which also have the above-mentioned beneficial effects which are not repeated here.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a malicious code confusion detection method, system, computer equipment and media. Background technique [0002] Code obfuscation is one of the main means for malicious code to hide itself. At present, there are mainly the following problems in the anti-detection and analysis technology of malicious code: the detection technology is relatively single, and it is difficult to accurately analyze the anti-detection ability of malicious code obfuscation. Traditional malicious code obfuscation and anti-detection analysis is mainly based on the dynamic running effect of malicious code or the actual debugging status. Such a test has many situations such as environment preparation and status analysis, which will lead to low detection efficiency and long detection time. Malicious code obfuscation and anti-detection capabilities are often not composed of a single technology. For e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563G06F2221/033
Inventor 戴涛陈华军许爱东关泽武丁伟
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products