-
公开(公告)号:US20180082064A1
公开(公告)日:2018-03-22
申请号:US15645767
申请日:2017-07-10
Applicant: SICHUAN UNIVERSITY , BEIJING TONGTECH CO., LTD.
Inventor: Junfeng WANG , Baoxin XU , Dong LIU , Fan LI , Xiaosong ZHANG
CPC classification number: G06F21/566 , G06F21/563 , G06F2221/033 , G06N5/003 , G06N7/005 , G06N20/00
Abstract: A method of detecting malware in Linux platform through the following steps: use objdump-D command to disassemble ELF format benign software and malware samples to generate assembly files; traverse the generated assembly files one by one, read the ELF files' code segment and meanwhile identify whether the code segment contains main( ) function; analyze the code segment read. Divide assembly code into different basic blocks. Each basic block is marked by its lowest address. Add control flow graph's vertex to the adjacency linked list; establish the relation between basic blocks, add control flow graph's edges to the adjacency linked list and generate a basic control flow graph; extract control flow graph's features and write them into ARFF files; take ARFF files as the data set of a machine learning tool named weka to carry out data mining and construct classifier; classify the ELF samples to be tested by using the classifier.