Analyze and detect malicious code for compound document binary storage format

Yubin Gao, De-yu Qi
{"title":"Analyze and detect malicious code for compound document binary storage format","authors":"Yubin Gao, De-yu Qi","doi":"10.1109/ICMLC.2011.6016767","DOIUrl":null,"url":null,"abstract":"Comparing traditional malicious attack, embedding malicious codes into documents is becoming a more efficient and hidden way. The attackers embed the malicious codes into a document based on the document storage format so that they activate secretively when the document is opened by third-party software. With a simple action of double click the document, it could bring a nightmare to the user. Through researching and analyzing the structure of compound file, we mainly focus on the Word documents, and try to find out a method to detect them. We have used the bloom filter as well as the entropy rate of Markov chain and reached a high accuracy. Detect embedded malicious codes by analyzing the embedded codes themselves, because they are machine instructions which must can execute by CPU. A basic assumption is that the machine instructions in the document are different from the normal text, pictures, tables, etc. The basic direction of detection is to find the different areas in the document. Thus, we use the entropy rate as a measure to quantify this distinction.","PeriodicalId":228516,"journal":{"name":"2011 International Conference on Machine Learning and Cybernetics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Machine Learning and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLC.2011.6016767","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Comparing traditional malicious attack, embedding malicious codes into documents is becoming a more efficient and hidden way. The attackers embed the malicious codes into a document based on the document storage format so that they activate secretively when the document is opened by third-party software. With a simple action of double click the document, it could bring a nightmare to the user. Through researching and analyzing the structure of compound file, we mainly focus on the Word documents, and try to find out a method to detect them. We have used the bloom filter as well as the entropy rate of Markov chain and reached a high accuracy. Detect embedded malicious codes by analyzing the embedded codes themselves, because they are machine instructions which must can execute by CPU. A basic assumption is that the machine instructions in the document are different from the normal text, pictures, tables, etc. The basic direction of detection is to find the different areas in the document. Thus, we use the entropy rate as a measure to quantify this distinction.
分析和检测复合文档二进制存储格式的恶意代码
与传统的恶意攻击相比,在文档中嵌入恶意代码成为一种更有效、更隐蔽的攻击方式。攻击者根据文档存储格式将恶意代码嵌入到文档中,以便在第三方软件打开文档时秘密激活。一个简单的双击文档的操作可能会给用户带来噩梦。通过对复合文件结构的研究和分析,重点研究了Word文档,并试图找到一种检测复合文件的方法。我们使用了布隆滤波和马尔可夫链的熵率,达到了较高的准确率。由于嵌入式恶意代码是必须由CPU执行的机器指令,因此通过分析嵌入式代码本身来检测嵌入式恶意代码。一个基本的假设是,文档中的机器指令不同于正常的文本、图片、表格等。检测的基本方向是在文件中找到不同的区域。因此,我们使用熵率作为度量来量化这种区别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信