Dynamic Malicious Code Detection Based on Binary Translator

被引:0
作者
Fang, Zhe [1 ]
Li, Minglu [1 ]
Weng, Chuliang [1 ]
Luo, Yuan [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai, Peoples R China
来源
CLOUD COMPUTING, PROCEEDINGS | 2009年 / 5931卷
关键词
binary translator; malicious code; dynamic detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The binary translator is a software component of a computer system. It converts binary code of one ISA into binary code of another ISA. Recent trends show that binary translators have been used to save CPU power consumption and CPU die size, which makes binary translators a possible indispensable component of future computer systems. And such situation would give new opportunities to the security of these computer systems. One of the opportunities is that we can perform malicious code checking dynamically in the layer of binary translators. This approach has many advantages, both in terms of capability of detection and checking overhead. In this paper, we proposed a working dynamic malicious code checking module integrated to an existent open-source binary translator. QEMU, and explained that our module's capability of detection is superior to other malicious code checking methods while acceptable performance is still maintained.
引用
收藏
页码:80 / 89
页数:10
相关论文
共 50 条
  • [21] THE BEHAVIOR ORIENTED DETECTION OF MALICIOUS CODE OVERVIEW
    Deng, Jin-Cheng
    Liu, Dan
    Hu, Yue
    Liang, Zong-Wen
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 235 - 238
  • [22] An ensemble framework for interpretable malicious code detection
    Cheng, Jieren
    Zheng, Jiachen
    Yu, Xiaomei
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10100 - 10117
  • [23] MALICIOUS CODE DETECTION WITH INTEGRATED BEHAVIOR ANALYSIS
    Li, Xiao-Yong
    Liu, Wei-Wei
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2797 - 2801
  • [24] Dynamic Detection of Unknown Malicious Executables Based on API Interception
    Chen, Fei
    Fu, Yan
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 329 - 332
  • [25] PBDG: a malicious code detection method based on precise behaviour dependency graph
    Tang, Chenghua
    Yang, Mengmeng
    Gao, Qingze
    Qiang, Baohua
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02) : 163 - 189
  • [26] A Multiple Pattern Matching Method for Malicious Code Detection
    Huang, Der-Chen
    Lo, Hung-Cheng
    Lai, Ping-Liang
    Chen, Wei-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 181 - 193
  • [27] Malicious code detection for Android using Instruction Signatures
    Hu Ge
    Li Ting
    Dong Hang
    Yu Hewei
    Zhang Miao
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337
  • [28] Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM
    Shen, Gaoning
    Chen, Zhixiang
    Wang, Hui
    Chen, Heng
    Wang, Shuqi
    COMPUTERS & SECURITY, 2022, 119
  • [29] A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning
    Yang W.
    Gao M.
    Jiang T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (05): : 1021 - 1034
  • [30] Feature representation and selection in malicious code detection methods based on static system calls
    Ding Yuxin
    Yuan Xuebing
    Zhou Di
    Dong Li
    An Zhanchao
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 514 - 524