A Semantic-Aware Method for Polymorphic Signature Generation

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:zhaolong0804
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  It is difficult for security experts to generate polymorphic signatures by using traditional string mining and matching techniques.A semantic-aware method is presented to generate a kind of two-level signature that includes both polymorphic semantics and string patterns.It first analyzes the characteristics of polymorphic engines and categorizes the data flows into different clusters and then uses static data flow methods to extract invariable semantic instructions.And then,it combines traditional string methods to generate the signature.In comparison with other methods,experimental results show that it may effectively reduce false positives and false negatives.
其他文献
针对加性水印中嵌入强度因子的自适应问题进行了研究,提出了一个基于信噪比的自适应音频水印算法.该算法在保证听觉质量的同时,利用信噪比自适应地调节嵌入强度因子,并将水印信号嵌入到音频数据经沃尔什-哈达玛变换后的低频系数中,水印检测时不需要原始音频信号参与.仿真实验结果表明该算法对诸如加噪、滤波、重量化、重采样和MP3压缩等常规信号处理具有较强的鲁棒性,可用于音频数据的版权保护。
To protect against algebraic attacks,a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers.In this paper,a new method based on a univariate polynomial re
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode,wherein insider attacks are the most challenging issue.To addres
Although there exist a few good schemes to protect the kernel hooks of operating systems,attackers are still able to circumvent existing defense mechanisms with spurious context information.To address
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized
This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that the linear complexity of a binary Jacobi sequ
This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method wit
Security testing is a key technology for software security.The testing results can reflect the relationship between Software testing and software security,and they can help program designers for evalu