Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 임을규 | - |
dc.contributor.author | 왕러 | - |
dc.date.accessioned | 2017-11-29T02:30:21Z | - |
dc.date.available | 2017-11-29T02:30:21Z | - |
dc.date.issued | 2017-08 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11754/33669 | - |
dc.identifier.uri | http://hanyang.dcollection.net/common/orgView/200000430931 | en_US |
dc.description.abstract | With the rapid development of Internet, malware has become increasingly serious in the field of computer security. Nowadays, most existing antivirus software use signature-based methods to detect malware. However, traditional signature-based method cannot detect malware effectively, which are processed by obfuscation technique. Thus, in order to address these problems above, we propose a detection system for malware, which uses dynamic binary instrumentation (DBI). We selected Intel Pin as our DBI tools to dynamically extract instructions. The extracted instruction sequences are converted into histogram date files, and make a similarity comparison among these files using normalized cross correlation algorithm. Experiment results show that the dynamic detection system can effectively distinguish malware and benign software. Keywords: Computer Security; Dynamic Analysis; Binary Instrumentation; Instruction sequence; Malware | - |
dc.publisher | 한양대학교 | - |
dc.title | Dynamic Binary Instrumentation을 활용한 악성코드 분류 | - |
dc.title.alternative | Malware Classification Method using Dynamic Binary Instrumentation | - |
dc.type | Theses | - |
dc.contributor.googleauthor | 왕러 | - |
dc.contributor.alternativeauthor | Le Wang | - |
dc.sector.campus | S | - |
dc.sector.daehak | 대학원 | - |
dc.sector.department | 컴퓨터·소프트웨어학과 | - |
dc.description.degree | Master | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.