In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism

碩士 === 國立雲林科技大學 === 資訊管理系 === 105 === Information crimes rise due to the rapid development, popularization and, application of computer and network. The defense mechanism and the analysis research can’t catch up the Malware attack in the countries and regions with the sharp growth rate.This paper id...

Full description

Bibliographic Details
Main Authors: CHEN, HSUAN-CHI, 陳炫錡
Other Authors: KOO,TUNG-MING
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/bwhyeb
id ndltd-TW-105YUNT0396053
record_format oai_dc
spelling ndltd-TW-105YUNT03960532018-05-13T04:29:22Z http://ndltd.ncl.edu.tw/handle/bwhyeb In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism 以逆向工程技術在API Function Call與System Call 機制上結合資訊可視化技術偵測Malware CHEN, HSUAN-CHI 陳炫錡 碩士 國立雲林科技大學 資訊管理系 105 Information crimes rise due to the rapid development, popularization and, application of computer and network. The defense mechanism and the analysis research can’t catch up the Malware attack in the countries and regions with the sharp growth rate.This paper identifies a method of static analysis of Malware with PE file type in Windows operating system, which obtains the API and uses the combination of Function call and Sytem call as normal software (Benign) and malware (Malware) The graphic is generated by the technology of information visualization, and displayed through the adjustment of different colors, shapes, branches, etc. It is not only to find out the visual characteristics of the normal software (benign) and malware (Malware) classification efficiency, but also to look for Malware attack techniques and the malicious writing style of designers (hackers). KOO,TUNG-MING 古東明 2017 學位論文 ; thesis 62 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立雲林科技大學 === 資訊管理系 === 105 === Information crimes rise due to the rapid development, popularization and, application of computer and network. The defense mechanism and the analysis research can’t catch up the Malware attack in the countries and regions with the sharp growth rate.This paper identifies a method of static analysis of Malware with PE file type in Windows operating system, which obtains the API and uses the combination of Function call and Sytem call as normal software (Benign) and malware (Malware) The graphic is generated by the technology of information visualization, and displayed through the adjustment of different colors, shapes, branches, etc. It is not only to find out the visual characteristics of the normal software (benign) and malware (Malware) classification efficiency, but also to look for Malware attack techniques and the malicious writing style of designers (hackers).
author2 KOO,TUNG-MING
author_facet KOO,TUNG-MING
CHEN, HSUAN-CHI
陳炫錡
author CHEN, HSUAN-CHI
陳炫錡
spellingShingle CHEN, HSUAN-CHI
陳炫錡
In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism
author_sort CHEN, HSUAN-CHI
title In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism
title_short In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism
title_full In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism
title_fullStr In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism
title_full_unstemmed In reverse engineering technology combined with information visualization technology to detect Malware on API Function Call and System Call Mechanism
title_sort in reverse engineering technology combined with information visualization technology to detect malware on api function call and system call mechanism
publishDate 2017
url http://ndltd.ncl.edu.tw/handle/bwhyeb
work_keys_str_mv AT chenhsuanchi inreverseengineeringtechnologycombinedwithinformationvisualizationtechnologytodetectmalwareonapifunctioncallandsystemcallmechanism
AT chénxuànqí inreverseengineeringtechnologycombinedwithinformationvisualizationtechnologytodetectmalwareonapifunctioncallandsystemcallmechanism
AT chenhsuanchi yǐnìxiànggōngchéngjìshùzàiapifunctioncallyǔsystemcalljīzhìshàngjiéhézīxùnkěshìhuàjìshùzhēncèmalware
AT chénxuànqí yǐnìxiànggōngchéngjìshùzàiapifunctioncallyǔsystemcalljīzhìshàngjiéhézīxùnkěshìhuàjìshùzhēncèmalware
_version_ 1718638839641145344