首页 | 本学科首页   官方微博 | 高级检索  
     


Anti-disassembly using Cryptographic Hash Functions
Authors:John Aycock  Rennie deGraaf  Michael Jacobson Jr
Affiliation:(1) Department of Computer Science, University of Calgary, Calgary, AB, Canada
Abstract:Computer viruses sometimes employ coding techniques intended to make analysis difficult for anti-virus researchers; techniques to obscure code to impair static code analysis are called anti-disassembly techniques. We present a new method of anti-disassembly based on cryptographic hash functions which is portable, hard to analyze, and can be used to target particular computers or users. Furthermore, the obscured code is not available in any analyzable form, even an encrypted form, until it successfully runs. The method’s viability has been empirically confirmed. We look at possible countermeasures for the basic anti-disassembly scheme, as well as variants scaled to use massive computational power.
Keywords:Code armoring  Reverse-engineering  Virus  Disassembly  Hash function
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号