A robust method for software self-defense

作者: P.S. Deng , W.-G. Shich , Jau-Hwang Wang , Cheng-Tan Tung , Chih-Pin Yen

DOI: 10.1109/CCST.2003.1297625

关键词:

摘要: To solve the drawbacks mentioned by Cohen [2001] and many other researchers in software self-defense method, we propose a new improved method this research to construct robust immune program code I make it almost impossible be removed from protected IP. The main idea achieve is that can masquerade being detected virus using polymorphism techniques are traditionally used writers. Besides polymorphism, encryption, multiple compressions mutation, also apply I. And let become more than millions of different patterns with same function. More, scheme generic attack self defense. Based on our experimental result, technique really proposed work well real world.

参考文章(20)
R Crawford, P Kerchen, K Levitt, R Olsson, M Archer, M Casillas, Automated assistance for detecting malicious code Office of Scientific and Technical Information (OSTI). ,(1993) , 10.2172/10176903
Frederick Cohen, Frederick B. Cohen, A short course on computer viruses ,(1994)
Jeffrey Kephart, Gregory Sorkin, Morton Swimmer, Steve White, Blueprint for a Computer Immune System Proceedings of the 1997 International Virus Bulletin Conference, San Francisco, California, October, 1997. pp. 242- 261 ,(1999) , 10.1007/978-3-642-59901-9_13
G. Russell, S. Woolgar, The social basis of troubles with software: the case of computer virus stories Viruses and their Impact on Future Computing Systems, IEE Colloquium on. ,(1990)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
G.J. Tesauro, J.O. Kephart, G.B. Sorkin, Neural networks for computer virus recognition IEEE Intelligent Systems. ,vol. 11, pp. 5- 6 ,(1996) , 10.1109/64.511768
E. Okamoto, H. Masumoto, ID-based authentication system for computer virus detection Electronics Letters. ,vol. 26, pp. 1169- 1170 ,(1990) , 10.1049/EL:19900756
S. Cass, Anatomy of malice [computer viruses] IEEE Spectrum. ,vol. 38, pp. 56- 60 ,(2001) , 10.1109/6.963235