Code obfuscation techniques for metamorphic viruses

作者: Jean-Marie Borello , Ludovic Mé

DOI: 10.1007/S11416-008-0084-2

关键词:

摘要: This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques respect to Our objective is evaluate difficulty a reliable static detection viruses that such techniques. Here we extend Spinellis’ result (IEEE Trans. Inform. Theory, 49(1), 280–284, 2003) on complexity bounded-length polymorphic In particular, prove particular category an \({\mathcal{NP}}\)-complete problem. Then empirically illustrate our by constructing practical obfuscator which could be used in future evade detection.

参考文章(24)
A.H. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (SAVE) annual computer security applications conference. pp. 326- 334 ,(2004) , 10.1109/CSAC.2004.37
Ravi Sethi, Jeffrey D. Ullman, Alfred V. Aho, Compilers: Principles, Techniques, and Tools ,(1986)
Jack Davidson, John Knight, Jonathan Hill, Chenxi Wang, Software Tamper Resistance: Obstructing Static Analysis of Programs University of Virginia. ,(2000)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
William Alexander Landi, Interprocedural aliasing in the presence of pointers Rutgers University. ,(1992) , 10.7282/T3-FYR2-A533
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov, An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs international conference on information security. ,vol. 2200, pp. 144- 155 ,(2001) , 10.1007/3-540-45439-X_10
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching Detection of Intrusions and Malware & Vulnerability Assessment. ,vol. 4064, pp. 129- 143 ,(2006) , 10.1007/11790754_8
L. Martignoni, D. Bruschi, M. Monga, Using code normalization for fighting self-mutating malware ISSSE International Symposium on Secure Software Engineering. pp. 37- 44 ,(2006)