{"title":"基于动态代码翻译的行为控制","authors":"Akihiro Sakai, Y. Hori, K. Sakurai","doi":"10.1109/SAINT.2010.103","DOIUrl":null,"url":null,"abstract":"When analyzing the behaviors of an existing binary code, it is difficult because need to learn about special technologies. Moreover, static analysis is also difficult to detect the malicious behaviors if codes are encrypted by themselves. In this paper, we propose the method of dynamic change of program behavior, and avoid executing malicious codes intentionally. In order to make it possible, we plan to generalize it to separate dynamic analysis codes from dynamic analysis technologies as reusable programming approach.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Behavior Control Based on Dynamic Code Translation\",\"authors\":\"Akihiro Sakai, Y. Hori, K. Sakurai\",\"doi\":\"10.1109/SAINT.2010.103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When analyzing the behaviors of an existing binary code, it is difficult because need to learn about special technologies. Moreover, static analysis is also difficult to detect the malicious behaviors if codes are encrypted by themselves. In this paper, we propose the method of dynamic change of program behavior, and avoid executing malicious codes intentionally. In order to make it possible, we plan to generalize it to separate dynamic analysis codes from dynamic analysis technologies as reusable programming approach.\",\"PeriodicalId\":381377,\"journal\":{\"name\":\"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAINT.2010.103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAINT.2010.103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Behavior Control Based on Dynamic Code Translation
When analyzing the behaviors of an existing binary code, it is difficult because need to learn about special technologies. Moreover, static analysis is also difficult to detect the malicious behaviors if codes are encrypted by themselves. In this paper, we propose the method of dynamic change of program behavior, and avoid executing malicious codes intentionally. In order to make it possible, we plan to generalize it to separate dynamic analysis codes from dynamic analysis technologies as reusable programming approach.