• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A Method for Analyzing Evolution of Computer Viruses

Research Project

Project/Area Number 24650032
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

MORI Akira  独立行政法人産業技術総合研究所, 知能システム研究部門, 研究グループ長 (30311682)

Project Period (FY) 2012-04-01 – 2014-03-31
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥3,510,000 (Direct Cost: ¥2,700,000、Indirect Cost: ¥810,000)
Fiscal Year 2013: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2012: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Keywordsネットワークセキュリティ技術 / コンピューターウィルス / 進化予測 / バイナリーコード解析 / 進化パターン予測 / バイナリーコード静的解析 / 全プログラム解析 / 静的単一代入形式 / 進化系藤樹 / エミュレーション / バイナリコード静的解析
Research Abstract

We have developed an automated method for analyzing evolution processes of computer viruses. We successfully reconstructed phylogenetic trees for real-world computer virus samples by comparing control flow graphs obtained by binary code analysis of executable programs. We also examined how frequent attack patterns of computer viruses appear along estimated evolution processes. In doing so, we developed a new method for identifying and analyzing context dependent shared code segments, such as functions and procedures, in binary executables without assuming the use of high-level programming languages.

Report

(3 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • Research Products

    (4 results)

All 2014 2013

All Presentation (4 results)

  • [Presentation] バイナリコードの全プログラム解析手法について2014

    • Author(s)
      森彰, 泉田大宗
    • Organizer
      2014年暗号と情報セキュリティシンポジウム(SCIS2014)
    • Related Report
      2013 Final Research Report
  • [Presentation] バイナリコードの全プログラム解析手法について2014

    • Author(s)
      森彰、泉田大宗
    • Organizer
      2014年 暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      城山観光ホテル
    • Related Report
      2013 Annual Research Report
  • [Presentation] 複数のプロセスとスレッドにまたがるマルウェア攻撃の自動解析について2013

    • Author(s)
      森彰, 泉田大宗
    • Organizer
      2013年暗号と情報セキュリティシンポジウム(SCIS2013)
    • Related Report
      2013 Final Research Report
  • [Presentation] 複数のプロセスとスレッドにまたがるマルウェア攻撃の自動解析について2013

    • Author(s)
      森彰、泉田大宗
    • Organizer
      SCIS2013 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ウェスティン都ホテル京都
    • Related Report
      2012 Research-status Report

URL: 

Published: 2013-05-31   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi