Please wait a minute...
Frontiers of Information Technology & Electronic Engineering

ISSN 2095-9184

Frontiers of Information Technology & Electronic Engineering  2018, Vol. 19 Issue (5): 583-603   https://doi.org/10.1631/FITEE.1601745
  本期目录
恶意代码行为描述与分析综述
喻波(), 方莹(), 杨强(), 唐勇(), 刘浏()
国防科技大学计算机学院,中国长沙市,410073
A survey of malware behavior description and analysis
Bo YU(), Ying FANG(), Qiang YANG(), Yong TANG(), Liu LIU()
College of Computer, National University of Defense Technology, Changsha 410073, China
 全文: PDF(600 KB)  
摘要:

基于行为的分析是恶意代码自动分析和检测过程中的一项重要技术,近年来得到学术界和工业界极大关注。恶意代码行为分析技术,能够避免传统静态分析技术遇到的恶意代码混淆的障碍,也能够通过行为描述规范表达恶意代码样本多样化的行为类型。目前,虽有一些关注恶意代码行为分析的工作,但基于行为的恶意代码分析技术仍未成熟,目前尚未发现介绍当前研究进展和发展挑战的综述。本文从3个方面对恶意代码的行为描述和分析进行综述:恶意代码行为描述,恶意代码行为分析模型,可视化。首先,全面梳理了现有行为分析技术的分析目标、原则、特点和分类,包括现有行为数据类型和描述方法;其次,从多方面分析恶意代码分析的不足和挑战;最后,探讨了潜在研究热点。

Abstract

Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how malware behaves, we can tackle the malware obfuscation problem, which cannot be processed by traditional static analysis approaches, and we can also derive the as-built behavior specifications and cover the entire behavior space of the malware samples. Although there have been several works focusing on malware behavior analysis, such research is far from mature, and no overviews have been put forward to date to investigate current developments and challenges. In this paper, we conduct a survey on malware behavior description and analysis considering three aspects: malware behavior description, behavior analysis methods, and visualization techniques. First, existing behavior data types and emerging techniques for malware behavior description are explored, especially the goals, principles, characteristics, and classifications of behavior analysis techniques proposed in the existing approaches. Second, the inadequacies and challenges in malware behavior analysis are summarized from different perspectives. Finally, several possible directions are discussed for future research.

Key wordsMalware behavior    Static analysis    Dynamic Analysis    Behavior data expression    Behavior analysis    Machine learning    Semantics-based analysis    Behavior visualization    Malware evolution
收稿日期: 2016-11-26      出版日期: 2018-07-20
通讯作者: 喻波     E-mail: yubo0615@nudt.edu.cn;fangying15@nudt.edu.cn;q.yang@nudt.edu.cn;ytang@nudt.edu.cn;hotmailliuliu@163.com
Corresponding Author(s): Bo YU   
 引用本文:   
喻波, 方莹, 杨强, 唐勇, 刘浏. 恶意代码行为描述与分析综述[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(5): 583-603.
Bo YU, Ying FANG, Qiang YANG, Yong TANG, Liu LIU. A survey of malware behavior description and analysis. Front. Inform. Technol. Electron. Eng, 2018, 19(5): 583-603.
 链接本文:  
https://academic.hep.com.cn/fitee/CN/10.1631/FITEE.1601745
https://academic.hep.com.cn/fitee/CN/Y2018/V19/I5/583
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed