作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (14): 108-110. doi: 10.3969/j.issn.1000-3428.2010.14.039

• 安全技术 • 上一篇    下一篇

隐式API调用行为的静态检测方法

付 文,赵荣彩,庞建民,王 成   

  1. (解放军信息工程大学信息工程学院,郑州 450002)
  • 出版日期:2010-07-20 发布日期:2010-07-20
  • 作者简介:付 文(1980-),女,博士研究生,主研方向:信息安全;赵荣彩、庞建民,教授、博士生导师;王 成,硕士研究生
  • 基金资助:

    国家“863”计划基金资助项目(2006AA01Z408, 2009AA01 Z434);河南省重大科技攻关基金资助项目(092101210500, 09210121 0501)

Static Detection Method for Obfuscated API-calling Behavior

FU Wen, ZHAO Rong-cai, PANG Jian-min, WANG Cheng   

  1. (Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002)
  • Online:2010-07-20 Published:2010-07-20

摘要:

为有效提取恶意程序及其变种中的隐式API调用行为,提出一种基于静态分析的隐式API调用行为检测方法。采用指令模板匹配的方法识别具体调用形式,通过分析调用目标地址与函数名之间的关系来识别被调用API函数。实验结果表明,该方法能提高静态分析工具对恶意代码及其变体的检测能力。

关键词: 恶意代码, 静态分析, 隐式API调用, 模板匹配

Abstract:

To extract API-calling behaviors from malware and their variants effectively, this paper proposes an approach to statically detect the obfuscated API-calling behaviors in Windows platform. In this approach, instruction pattern matching is used to recognize the special calling manner. The relationship between the targets of call instructions and the name strings of API functions is analyzed to identify which API function is called actually. Experimental results show that using this approach can improve detection ability of static analysis tools through static analysis.

Key words: malware, static analysis, obfuscated API-calling, pattern match

中图分类号: