کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
454459 695199 2014 14 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Covert Computation — Hiding code in code through compile-time obfuscation
ترجمه فارسی عنوان
محاسبه پنهان کردن کد در کد از طریق سوءاستفاده از زمان کامپایل
کلمات کلیدی
سوءاستفاده از کد، عوارض جانبی، رمزنگاری کد شناسایی بدافزار معروف، تکه تکه کردن زمان
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Recently, the concept of semantic-aware malware detection has been proposed in the literature. Instead of relying on a syntactic analysis (i.e., comparison of a program to pre-generated signatures of malware samples), semantic-aware malware detection tries to model the effects a malware sample has on the machine. Thus, it does not depend on a specific syntactic implementation. For this purpose a model of the underlying machine is used. While it is possible to construct more and more precise models of hardware architectures, we show that there are ways to implement hidden functionality based on side effects in the microprocessor that are difficult to cover with a model. In this paper we give a comprehensive analysis of side effects in the x86 architecture and describe an implementation concept based on the idea of compile-time obfuscation, where obfuscating transformations are applied to the code at compile time. Finally, we provide an evaluation based on a prototype implementation to show the practicability of our approach and estimate complexity and space overhead using actual malware samples.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Security - Volume 42, May 2014, Pages 13–26
نویسندگان
, , , , , , ,