浏览全部资源
扫码关注微信
[ "王奕钧(1983-),男,公安部第一研究所工程师,主要研究方向为网络信息安全。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-20
移动端阅览
王奕钧. 杀毒软件中指令虚拟机的脆弱性分析[J]. 电信科学, 2016,32(10):165-174.
Yijun WANG. Analysis of instructions virtual machine vulnerabilities in anti-virus software[J]. Telecommunications science, 2016, 32(10): 165-174.
王奕钧. 杀毒软件中指令虚拟机的脆弱性分析[J]. 电信科学, 2016,32(10):165-174. DOI: 10.11959/j.issn.1000-0801.2016274.
Yijun WANG. Analysis of instructions virtual machine vulnerabilities in anti-virus software[J]. Telecommunications science, 2016, 32(10): 165-174. DOI: 10.11959/j.issn.1000-0801.2016274.
指令虚拟机技术是当今反病毒领域采用的核心技术之一,绝大多数杀毒软件的扫描引擎均采用指令虚拟技术来分析文件,以还原这个程序的行为是否会威胁到系统安全,根据这个进程的行为特征判断它是否是病毒或木马。针对杀毒软件中指令虚拟机的特点,研究虚拟环境与真实环境的差异,在深入分析指令虚拟机和计算机病毒木马本质特征的基础上,理论与实践研究相结合,给出目前杀毒软件中指令虚拟机的脆弱性分析。
Instructions virtual machine technology is one of the core technologies used in today's anti-virus field
the vast majority of anti-virus software scan engines use virtualization technology to analyze file and to revert the behavior of this program whether will be a threat to system security or not. According to this process behavioral characteristics
it is determined whether it is a virus or Trojan. Aiming at features of the virtual machine in anti-virus software
the difference between virtual environments and real environment were researched.Based on in-depth analysis of the virtual machine technology and the essential characteristics of a computer virus and Trojan
theory and practice of research were combined and the analysis of virtual machine instructions vulnerability in current anti-virus software was given.
李换双 , 潘平 , 罗辉 . 计算机安全漏洞及防范研究 [J ] . 微型与应用 , 2013 , 32 ( 7 ): 64 - 65 .
LI H S , PAN P , LUO H . Computer security vulnerabilities and preventive measures [J ] . Microcomputer & its Applications , 2013 , 32 ( 7 ): 64 - 65 .
朱平 , 杜彦辉 . 基于虚拟机与API调用监控技术的APT 木马取证研究 [J ] . 信息网络安全 , 2014 ( 4 ): 78 - 81 .
ZHU P , DU Y H . Research on APT-Trojan forensics based on virtual machine and API monitor [J ] . Netinfo Security , 2014 ( 4 ): 78 - 81 .
高玉新 , 张怡 , 唐勇 , 等 . 恶意代码反分析与分析综述 [J ] . 小型微型计算机系统 , 2015 , 36 ( 10 ): 2322 - 2326 .
GAO Y X , ZHANG Y , TANG Y , et al . Survey on malware anti-analysis and analysis [J ] . Mini-Micro Systems , 2015 , 36 ( 10 ): 2322 - 2326 .
蒋晓峰 , 施勇 , 薛质 . 针对虚拟机查毒的规避方法研究[ [J ] . 信息安全与通信保密 , 2011 ( 2 ): 55 - 57 .
JIANG X F , XUE Z . Study on circumvention of virtual machine anti-virus [J ] . China Information Security , 2011 ( 2 ): 55 - 57 .
Riusksk . Analysis of virtual machine detection technology [J ] . Hacker Defence , 2010 ( 7 ): 207 - 211 .
GReAT . Equation: the death star of malware galaxy [EB/OL ] . ( 2015 - 02 - 16 )[ 2016 - 08 - 20 ] . https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/ https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/ .
0
浏览量
379
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构