Abstract:
Based on the analysis of the obfuscating transformation technology used by malicious code, this paper formally specifies the obfuscating transformation, presents a framework of obfuscating transformation engine, and develops a prototype. The experiment results show that obfuscating transformation can be used to improve the survivability of the malicious code.
Key words:
Malicious code,
Signature scanning,
Obfuscating transformation,
Metamorphism
摘要: 在分析恶意代码模糊变换技术的基础上,给出了恶意代码模糊变换的形式化描述,提出了模糊变换引擎的框架结构,实现了恶意代码模糊变换引擎原型。试验结果表明模糊变换技术可以有效地提高恶意代码的生存能力。
关键词:
恶意代码,
特征码扫描,
模糊变换,
变形
CLC Number:
PANG Lihui; HU Huaping. Research on Obfuscating Transformation Technology for Malicious Code[J]. Computer Engineering, 2007, 33(12): 154-156.
庞立会;胡华平. 恶意代码模糊变换技术研究[J]. 计算机工程, 2007, 33(12): 154-156.