Detection of Software Similarity Based on Run-Time Program Structures

碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 100 === Internet has been one of the most important parts in our daily life. Although it brings a lot of benefits to people, it is also a convenient platform for attackers to spread software. Most existing techniques used to detect malicious software are based on patte...

Full description

Bibliographic Details
Main Authors: Sheng-Yao Hsu, 許勝堯
Other Authors: Chin-Ying Huang
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/90057774710464462237
id ndltd-TW-100NTOU5394030
record_format oai_dc
spelling ndltd-TW-100NTOU53940302015-10-13T22:51:53Z http://ndltd.ncl.edu.tw/handle/90057774710464462237 Detection of Software Similarity Based on Run-Time Program Structures 基於動態程式結構的軟體相似度偵測技術 Sheng-Yao Hsu 許勝堯 碩士 國立臺灣海洋大學 資訊工程學系 100 Internet has been one of the most important parts in our daily life. Although it brings a lot of benefits to people, it is also a convenient platform for attackers to spread software. Most existing techniques used to detect malicious software are based on patterns and signatures of malware codes. However, it can be evaded by rewriting malware or even using automatic tools such as a packer to obfuscate the codes. The goal of this thesis is to detect codes obfuscated by packers. The basic idea is that an obfuscated code should have similar program structure to the original version. Therefore, we use pin-tool, a dynamic instrument tool, to monitor the execution of a program and extract its run-time program structure by construction call graphs. We then identify program similarity by comparing nodes in the call graphs. The proposed solution is able to successfully match packed software with its original version. Experiments on both malicious and benign programs show that all evaluated software with it’s a proper configuration. Chin-Ying Huang 黃俊穎 2012 學位論文 ; thesis 47 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 100 === Internet has been one of the most important parts in our daily life. Although it brings a lot of benefits to people, it is also a convenient platform for attackers to spread software. Most existing techniques used to detect malicious software are based on patterns and signatures of malware codes. However, it can be evaded by rewriting malware or even using automatic tools such as a packer to obfuscate the codes. The goal of this thesis is to detect codes obfuscated by packers. The basic idea is that an obfuscated code should have similar program structure to the original version. Therefore, we use pin-tool, a dynamic instrument tool, to monitor the execution of a program and extract its run-time program structure by construction call graphs. We then identify program similarity by comparing nodes in the call graphs. The proposed solution is able to successfully match packed software with its original version. Experiments on both malicious and benign programs show that all evaluated software with it’s a proper configuration.
author2 Chin-Ying Huang
author_facet Chin-Ying Huang
Sheng-Yao Hsu
許勝堯
author Sheng-Yao Hsu
許勝堯
spellingShingle Sheng-Yao Hsu
許勝堯
Detection of Software Similarity Based on Run-Time Program Structures
author_sort Sheng-Yao Hsu
title Detection of Software Similarity Based on Run-Time Program Structures
title_short Detection of Software Similarity Based on Run-Time Program Structures
title_full Detection of Software Similarity Based on Run-Time Program Structures
title_fullStr Detection of Software Similarity Based on Run-Time Program Structures
title_full_unstemmed Detection of Software Similarity Based on Run-Time Program Structures
title_sort detection of software similarity based on run-time program structures
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/90057774710464462237
work_keys_str_mv AT shengyaohsu detectionofsoftwaresimilaritybasedonruntimeprogramstructures
AT xǔshèngyáo detectionofsoftwaresimilaritybasedonruntimeprogramstructures
AT shengyaohsu jīyúdòngtàichéngshìjiégòuderuǎntǐxiāngshìdùzhēncèjìshù
AT xǔshèngyáo jīyúdòngtàichéngshìjiégòuderuǎntǐxiāngshìdùzhēncèjìshù
_version_ 1718081240667521024