Detection Method of Trojan Horse Based on Attack Tree

杨彦,黄皓
DOI: https://doi.org/10.16208/j.issn1000-7024.2008.11.015
2008-01-01
Abstract:Trojan is malicious program which is designed to obtain privilege and steal information; it seriously endangers the internet se- curity and information security. The rules of Trojan's attack actions are researched, a new Trojan horse detection method based on executable static analysis is proposed. The present attack tree model is improved, an extended attack tree model is designed to d escribe the sequences of threatening system calls Trojan commonly used. Matched the set of APIs used in PE file with the original extended attack tree, to predict the attack actions may appear in the implementation of the PE file and estimate whether the PE file is a Trojan.
What problem does this paper attempt to address?