Static Extracting Method of Software Intended Behavior Based on API Functions Invoking

被引:11
作者
PENG GuojunPAN XuanchenFU JianmingZHANG Huanguo School of ComputerWuhan UniversityWuhan HubeiChina [430072 ]
机构
关键词
API functions invoking; software intended behavior; trusted behavior;
D O I
暂无
中图分类号
TP311.5 [软件工程];
学科分类号
081202 ; 0835 ;
摘要
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentica-tion. In this paper,the author proposes a specified measure of ex-tracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking,and also introduces the definition of the struc-ture used to store the SIBDS in detail. Experimental results dem-onstrate that the extracting method and the storage structure defi-nition offers three strong properties: (i) it can describe the soft-ware's intended behavior accurately; (ii) it demands a small stor-age expense; (iii) it provides strong capability to defend against mimicry attack.
引用
收藏
页码:615 / 620
页数:6
相关论文
共 5 条
[1]   基于可执行文件静态分析的入侵检测模型 [J].
苏璞睿 ;
杨轶 .
计算机学报, 2006, (09) :1572-1578
[2]   基于系统调用子集的入侵检测 [J].
张相锋 ;
孙玉芳 ;
赵庆松 .
电子学报, 2004, (08) :1338-1341
[3]   基于HMM的系统调用异常检测 [J].
闫巧 ;
谢维信 ;
宋歌 ;
喻建平 .
电子学报, 2003, (10) :1486-1490
[4]   计算机系统入侵检测的隐马尔可夫模型 [J].
谭小彬 ;
王卫平 ;
奚宏生 ;
殷保群 .
计算机研究与发展, 2003, (02) :245-250
[5]   Intrusion detection using sequences of system calls [J].
Hofmeyr, Steven A. ;
Forrest, Stephanie ;
Somayaji, Anil .
Journal of Computer Security, 1998, 6 (03) :151-180