作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (7): 144-146. doi: 10.3969/j.issn.1000-3428.2010.07.049

• 安全技术 • 上一篇    下一篇

反汇编过程中call指令后混淆数据的识别

岳 峰,庞建民,赵荣彩,白莉莉   

  1. (信息工程大学信息工程学院,郑州 450002)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-04-05 发布日期:2010-04-05

Identification of Obfuscated Data After call Instruction in Disassembly Process

YUE Feng, PANG Jian-min, ZHAO Rong-cai, BAI Li-li   

  1. (Institute of Information Engineering, Information Engineering University, Zhengzhou 450002)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-04-05 Published:2010-04-05

摘要: 恶意程序往往使用各种混淆手段来阻碍静态反汇编,call指令后插入数据便是常用的一种,对该方式的混淆进行研究,提出一种有效的识别call指令后混淆数据的方法。该方法基于改进的递归分析反汇编算法,分两阶段对混淆进行处理。经测试验证,该方法可有效地对此种混淆做出判断,提高反汇编的准确性。

关键词: 静态反汇编, 代码混淆, 恶意代码

Abstract: A number of obfuscation techniques are used to foil the static disassembly process by malware, in which embedding obfuscated data after call instruction is the most common style. This paper presents a detection arithmetic that can abstract the obfuscated data accurately after the call instruction. Based on improved recursive traversal disassembly arithmetic, this method can handle this style of obsfuscation in two phases. A test report is provided to prove the effect of this arithmetic.

Key words: static disassembly, code obfuscation, malicious code

中图分类号: