Dynamic Malicious Code Detection Based on Binary Translator

被引:0
|
作者
Fang, Zhe [1 ]
Li, Minglu [1 ]
Weng, Chuliang [1 ]
Luo, Yuan [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai, Peoples R China
来源
CLOUD COMPUTING, PROCEEDINGS | 2009年 / 5931卷
关键词
binary translator; malicious code; dynamic detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The binary translator is a software component of a computer system. It converts binary code of one ISA into binary code of another ISA. Recent trends show that binary translators have been used to save CPU power consumption and CPU die size, which makes binary translators a possible indispensable component of future computer systems. And such situation would give new opportunities to the security of these computer systems. One of the opportunities is that we can perform malicious code checking dynamically in the layer of binary translators. This approach has many advantages, both in terms of capability of detection and checking overhead. In this paper, we proposed a working dynamic malicious code checking module integrated to an existent open-source binary translator. QEMU, and explained that our module's capability of detection is superior to other malicious code checking methods while acceptable performance is still maintained.
引用
收藏
页码:80 / 89
页数:10
相关论文
共 50 条
  • [1] Detection technology of malicious code based on semantic
    Lu, Qingmei
    Wang, Yulin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555
  • [2] Malicious Code Detection Based on Software Fingerprint
    Yin, Zhimin
    Yu, Xiangzhan
    Niu, Linhua
    PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
  • [3] Detection technology of malicious code based on semantic
    Qingmei Lu
    Yulin Wang
    Multimedia Tools and Applications, 2017, 76 : 19543 - 19555
  • [4] Malicious Code Detection Model Based on Behavior Association
    Lansheng Han
    Mengxiao Qian
    Xingbo Xu
    Cai Fu
    Hamza Kwisaba
    Tsinghua Science and Technology, 2014, 19 (05) : 508 - 515
  • [5] Malicious Code Detection Model Based on Behavior Association
    Han, Lansheng
    Qian, Mengxiao
    Xu, Xingbo
    Fu, Cai
    Kwisaba, Hamza
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 508 - 515
  • [6] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [7] Malicious code detection based on heterogeneous information network
    Liu Y.
    Hou Y.
    Yan H.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 258 - 265
  • [8] Malicious code dynamic traffic camouflage detection based on deep reinforcement learning in power system
    Tang Xiaoqiang
    He Bingzhe
    ENERGY REPORTS, 2022, 8 : 1424 - 1435
  • [9] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [10] A Fast Malicious Code Detection Method Based on Feature Fusion
    Wang S.
    Wang J.
    Wang Y.-N.
    Song Y.-F.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66