Homology Judgment Technology of Malicious Code

Qian-feng CHU,Xin-yu ZHU,Gong-shen LIU
DOI: https://doi.org/10.3969/j.issn.1002-0802.2017.07.028
2017-01-01
Abstract:The proliferation of malicious code threatens the information and property security of the people at all times. The facts indicate that many new types of malicious code are variants of the existing code, and by using the deformation, packing, polymorphism, code disruption and other technologies to modify these existing malicious codes, the scanning from traditional detection technologies could be avoided. For this reason, and based on static mode, dynamic and combination of both modes, the homology judgment technologies of malicious codes are summarized and classified, and their basic principles, implement details, features, strengths and limitations also discussed, expecting to effectively solve the detection and processing of newly-emerging malicious codes. Finally, the development direction of homology judgment technologies is forecasted, thus to promote the further research.
What problem does this paper attempt to address?