博碩士論文 107522021 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator許瓈方zh_TW
DC.creatorLi-Fang Hsuen_US
dc.date.accessioned2021-7-27T07:39:07Z
dc.date.available2021-7-27T07:39:07Z
dc.date.issued2021
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=107522021
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract過去半個世紀以來,隨著Windows OS在個人電腦市場上的宰制性,資訊安全人員與駭客之間的戰場主要放在了Windows-based的惡意程式上。近年來隨著IoT(Internet of Things)的發展,能夠支援更多元架構的Linux作業系統被大量使用在更輕薄的嵌入式裝置上,讓攻擊者逐漸將目光放在了Linux作業系統上。 根據以往Windows-based惡意程式的發展經驗,在這場資訊安全人員與駭客之間的貓捉老鼠遊戲中,由於虛擬機或沙箱經常被惡意程式分析人員用於分析惡意程式,惡意程式為了最大程度的阻止資訊安全人員的分析,絕大多數都發展出了相應的虛擬機偵測機制,因此可以預期Linux-based惡意程式極大可能也同樣會走向這樣的結果。 由於這類惡意程式在檢測到自己在虛擬機之後,會表現出與不在虛擬機中不同的行為,本篇論文針對Linux-based惡意程式現有及未來可能會出現的虛擬機偵測機制進行分析,提出一套能夠停止帶有虛擬機偵測機制的惡意程式的方法,命名為VMDMD,為Virtual Machine Detection-based Malware Defender的縮寫。VMDMD在偵測到目標Process執行類似虛擬機檢測的行為時,會先fork出一個新Process(於本篇論文中,我們簡稱為FDP,Fake Data Process)並給予其虛擬機上的假資料,同時記錄它的執行流程,之後再恢復原本Process並比對他們的行為,只要一不相同就馬上停止其執行。zh_TW
dc.description.abstractFor the half past century, with the dominating of Windows Operating System on the market share of Personal Computer, the war between Security researchers and attackers mainly focus on Windows-based malware. Recently, with the development of IoTs (Internet of Things), more embedded devices tend to use Linux Operating System, which could support various kinds of architecture. According to the experience on Windows-based malware, in this “Cat and Mouse Game”between attacks and security researchers, in order to prevent analysis on malware by malware analyst, the malware writers used to apply virtual machine detect mechanism (anti-vm, evasive) on malware, since virtual machines or sandboxes are widely used on analyzing malware . Although it is still not a trend on Linux-malware, we expect there will be more malware start to detect virtual machine detect method to avoid analysis. Since this kind of malware usually change its behavior after detecting itself a in virtual machine. In this paper, we focus on the evasive method used by Linux-based malware, proposing a mechanism to detect the evasive behavior, which is called VMDMD, it is a abbreviation for Virtual Machine Detection-based Malware Defender). VMDMD will fork another target process (hereafter we call it FDP, Fake Data Process) and provide fake information as if the target process behaves evasive, and trace its execution and result. And then resume the target program with the real information, and stop its execution after behave differently from FDP.en_US
DC.subject虛擬機檢測zh_TW
DC.subjectLinux惡意程式zh_TW
DC.subjectVM detectionen_US
DC.subjectLinux Malwareen_US
DC.titleVMDMD: A Solution to Defend a Linux System against VM-detection-based Malwareen_US
dc.language.isoen_USen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明