期刊文献+

基于虚拟机的恶意代码检测系统研究

Study and Design of Malware Detection Technology based on Hardware-assisted Virtualization
原文传递
导出
摘要 在深入分析恶意代码及其检测技术特征的基础上,提出一种基于硬件虚拟机的恶意代码检测系统,轻量级虚拟机是基于硬件虚拟化技术实现的小型虚拟机,为文件检测提供环境。行为监控模块负责监控被检测文件的所有行为,并把这些行为记录下来为后面的分析提供依据。行为分析模块是系统的数据处理模块,需要对数据进行收集、分类、分析处理然后归纳得出测试结果。 Based on in-depth analysis of the characteristics and detection technology of malicious code, a new malicious code detection model based on hardware-assisted virtualization technology is proposed. Lightweight virtual machine is a small virtual machine based on hardware virtualization technology and provides the environment for file detection. Behaviors monitoring module monitors all the behaviors of the detected file, and records these behaviors, thus to provide a basis for the subsequent analysis. The behaviors analysis module, as a data processing module of the system, implements data collection, classification, analysis and processing and summarizes the obtained test results.
出处 《信息安全与通信保密》 2013年第5期79-81,共3页 Information Security and Communications Privacy
关键词 恶意代码 硬件虚拟化 检测系统 malicious code hardware-assisted virtualization detection system
  • 相关文献

参考文献10

二级参考文献57

  • 1王驎峰,董亮卫.Windows(2000/XP)下隐藏进程的检测机制[J].计算机工程,2006,32(20):95-96. 被引量:7
  • 2WANG Y M, BECK D, VO B, et al. Detecting stealth software with strider ghost buster [ C ]//Proc of International Conference on Dependable Systems and Networks (DSN'05). 2005:368-377.
  • 3UHLIG R, NEIGER G, RODGERS D, et al. Intel virtualization technology[ J]. IEEE Computer,2005,38(5) : 48-56.
  • 4WEN Yan, ZHAO Jin-jing, WANG Huai-min. Implicit detection of hidden processes with a local-booted virtual machine [ C ]//Proc of the 2nd International Conference on Information Security and Assurance ( ISA' 08 ). 2008.
  • 5Aphex: AFX Windows rootkit [ EB/OL ]. [ 2007-11 - 21 ]. http :// www. iamaphex. cjb. net.
  • 6Hacker defender[ EB/OL]. [ 2007-11-25 ]. http ://hxdef. org/.
  • 7Fuzen_op, FU rootkit [ EB/OL ]. [ 2007-11-23 ]. http ://www. rootkit. com/project. php? id = 12.
  • 8SILBERMAN P, C H A O S. FUTo:bypassing blacklight and icesword [ EB/OL ]. [ 2007-11-26 ]. https://www. rootkit. com/newsread. php? newsid = 433.
  • 9PE386. phide_ex-untimate process hiding example [ EB/OL ]. [ 2007- 11- 24 ]. http ://forum. sysintemals. corn/printer_friendly_posts. asp? TID = 8527.
  • 10Anti Rootkit Group [ EB/OL ]. [ 2007 -11 - 28 ]. http ://www. antirootkit. com/blog/.

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部