网络与信息安全学报 (Feb 2017)

Successive memory image analysis method for malicious codes

  • Wei-ming LI,
  • De-qing ZOU,
  • Guo-zhong SUN

Journal volume & issue
Vol. 3
pp. 20 – 30

Abstract

Read online

In order to detect the behavior of malicious code more comprehensively, the technology of continuous memory image analysis was proposed. The core idea was to run malicious code in QEMU virtual machine, to obtain the memory image of the continuous increment in the running period, and then to analyze the memory image of the base and increment as the memory image. On the basis of the analysis of a single memory image, different memory images were analysised comparatively. At the same time, the visualization tool D3.js was used to visually display the change of the memory state in the process of system operation. Finally, the prototype system was tested by 40 kinds of malicious code samples, and the number of malicious code behavior was increased by 19.7% than traditional sin-gle memory image.

Keywords