作者: Purui Su , Lingyun Ying , Dengguo Feng
DOI: 10.1109/CIS.2008.130
关键词:
摘要: Executing malware in a controlled environment is one of the most popular and effective methods extracting behavior characters malware. In this paper, we propose dynamic analysis technique to explore different behaviors We utilized constitution create comprehensive reports on This allowed us extract common paths identify what seems be typical behavior. likewise used static document interactions between environment, after which, based constitution, dynamically triggered path selections that observed have been pursued by Different inputs were generated reverse selection conditions, method for exploration all possible paths, thereby permitted generate relatively report study. The also filter invalid data unable earlier process. became even more helpful when implemented vulnerability among types commercial software; here, prototype system was set up, finished experiments evaluate system. result showed could without exploring its paths.