467 0

Full metadata record

DC FieldValueLanguage
dc.contributor.advisor임을규-
dc.contributor.author왕러-
dc.date.accessioned2017-11-29T02:30:21Z-
dc.date.available2017-11-29T02:30:21Z-
dc.date.issued2017-08-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/33669-
dc.identifier.urihttp://hanyang.dcollection.net/common/orgView/200000430931en_US
dc.description.abstractWith the rapid development of Internet, malware has become increasingly serious in the field of computer security. Nowadays, most existing antivirus software use signature-based methods to detect malware. However, traditional signature-based method cannot detect malware effectively, which are processed by obfuscation technique. Thus, in order to address these problems above, we propose a detection system for malware, which uses dynamic binary instrumentation (DBI). We selected Intel Pin as our DBI tools to dynamically extract instructions. The extracted instruction sequences are converted into histogram date files, and make a similarity comparison among these files using normalized cross correlation algorithm. Experiment results show that the dynamic detection system can effectively distinguish malware and benign software. Keywords: Computer Security; Dynamic Analysis; Binary Instrumentation; Instruction sequence; Malware-
dc.publisher한양대학교-
dc.titleDynamic Binary Instrumentation을 활용한 악성코드 분류-
dc.title.alternativeMalware Classification Method using Dynamic Binary Instrumentation-
dc.typeTheses-
dc.contributor.googleauthor왕러-
dc.contributor.alternativeauthorLe Wang-
dc.sector.campusS-
dc.sector.daehak대학원-
dc.sector.department컴퓨터·소프트웨어학과-
dc.description.degreeMaster-
Appears in Collections:
GRADUATE SCHOOL[S](대학원) > COMPUTER SCIENCE(컴퓨터·소프트웨어학과) > Theses (Ph.D.)
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE