期刊文献+

基于Bayes决策的密码算法识别技术 被引量:9

Cryptogram Algorithm Recognition Technology Based on Bayes Decision-making
在线阅读 下载PDF
导出
摘要 在可执行代码中识别密码算法对于查找恶意代码、保护计算机系统安全有着重要的意义。该文在对汇编级密码算法特征分析的基础上,提出了汇编级密码算法特征度量元的概念,并采用七维特征向量对其进行形式化描述,建立基于Bayes决策的密码算法识别模型,测试结果表明该模型稳定、准确,能够高效地定位代码中的密码算法。 Recognizing cryptogram algorithm from executable codes plays an important significance in checking malicious codes and protecting computer system. This paper brings forward the concept of assemble cryptogram algorithm characteristic-measurement based on analyzing a lot of assemble cryptogram algorithms, and using seven-dimension characteristic vector to describe it, then constructs a cryptogram algorithm recognition model based on Bayes decision-making. The testing shows that this model is scalable and exact.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第20期159-160,163,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z409)
关键词 算法识别 程序理解 决策模型 特征度量元 algorithm recognition program understanding decision-making model haracteristic-measurement
  • 相关文献

参考文献4

  • 1Alias C. Program Optimization by Template Recognition and Replacement[D]. Versailles, France: University of Versailles Saint-Quentin. 2005.
  • 2SCHNEIER B.应用密码学[M].北京:机械工业出版社,2001.
  • 3MENEZES AJ, VAN OORSCHOT PC, VANSTONE SA.应用密码学手册[M].胡磊,王鹏,译.北京:电子工业出版社,2005.
  • 4杨广正,吴岷,张晓莉,等.模式识别[M].合肥:中国科学技术大学出版社,2003.

共引文献40

同被引文献79

  • 1叶生勤.公钥密码理论与技术的研究现状及发展趋势[J].计算机工程,2006,32(17):4-6. 被引量:15
  • 2Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone.应用密码学手册[M].北京:电子工业出版社,2005-6.12-14.
  • 3Kinder J,Katzenbeisser S,Schllhart C.Detecting malicious code by model checking[C].Vienna:Proceeding of the GISIG SIDAR Conference on Detection of Instrusions and Malware & Vulnera- bility Assessment.Springer,2005:174-187.
  • 4Christodorescu M,Jha S,Seshia S A.Semantics-aware Malware detection[C].IEEE Symposium on Security and Privacy,2005: 32-46.
  • 5段刚.加密与解密[M].3版.北京:电子工业出版社,2008:167-191.
  • 6Schwarz B,Chen H,Wagner D.Model checking an entire linux distribution for security violation[C].Los Alamitos,CA:Proc An- nual Computer Security Applications Conference. IEEE Com- puter Society,2005:13-22.
  • 7Chirs Eagle.The IDA pro book[M].石华耀,译.北京:人民邮电出版社,2010:162-172.
  • 8Hex-Rays SA.Hex-Rays decompiler[EB/OL], http://www.hex- rays.com/,2005.
  • 9Wei T, Mao J, Zou W. Structuring 2-way branches in binary executables [C]. Beijing: 31 st Annual IEEE International Com- puter Software and Applications Conference,2007:115 - 118.
  • 10Wei T, Mao J,Zou W.A new algorithm for identifying loops in de- compilation [C]. Kongens Lyngby, Denmark: The 14th Interna- tional Static Analysis Symposium,2007:170-183.

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部