论文标题

迈向建模牢不可破的恶意软件的第一步

The First Step Towards Modeling Unbreakable Malware

论文作者

Ji, Tiantian, Fang, Binxing, Cui, Xiang, Wang, Zhongru, Diao, Jiawen, Wang, Tian, Yu, Weiqiang

论文摘要

构建隐形恶意软件已在网络攻击者中越来越受欢迎,以掩盖其恶意意图。然而,构建的隐形恶意软件仍然无法在安全专家的反向工程中生存。因此,本文使用“牢不可破的”安全属性毫无疑问的恶意软件(UBM)建模了一种恶意软件,并通过建模,方法分析,实验,评估和防御能力测试对这种新型威胁进行了系统的探测。具体来说,我们首先将UBM的定义进行正式化,并分析了其安全属性,提出了两个核心功能,这些功能对于实现“牢不可破”的安全属性至关重要,以及其相关的四个用于评估。然后,我们根据我们对上述两个核心功能的评估来验证了四种用于构建UBM的算法,并验证了“坚不可摧”的安全属性。之后,采用了四种经过验证的算法来构建UBM实例,并通过分析其体积增加和反防卫能力,我们确认了UBM的现实世界中适用性。最后,为了解决UBM对网络空间产生的新威胁,本文探讨了一些可能的防御措施,以期建立针对UBM攻击的防御系统。

Constructing stealthy malware has gained increasing popularity among cyber attackers to conceal their malicious intent. Nevertheless, the constructed stealthy malware still fails to survive the reverse engineering by security experts. Therefore, this paper modeled a type of malware with an "unbreakable" security attribute-unbreakable malware (UBM), and made a systematical probe into this new type of threat through modeling, method analysis, experiments, evaluation and anti-defense capacity tests. Specifically, we first formalized the definition of UBM and analyzed its security attributes, put forward two core features that are essential for realizing the "unbreakable" security attribute, and their relevant tetrad for evaluation. Then, we worked out and implemented four algorithms for constructing UBM, and verified the "unbreakable" security attribute based on our evaluation of the abovementioned two core features. After that, the four verified algorithms were employed to construct UBM instances, and by analyzing their volume increment and anti-defense capacity, we confirmed real-world applicability of UBM. Finally, to address the new threats incurred by UBM to the cyberspace, this paper explored some possible defense measures, with a view to establishing defense systems against UBM attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源