期刊名称:International Journal of Security and Its Applications
印刷版ISSN:1738-9976
出版年度:2015
卷号:9
期号:5
页码:95-104
DOI:10.14257/ijsia.2015.9.5.10
出版社:SERSC
摘要:Trustiness of software dynamic behavior is always the research hotpot and difficult point in the field of trusted computing. Dynamic trustiness model of software behavior relies on three basic aspects including the extraction and description of intended software behavior, real-time monitoring of software behavior and a contrastive analysis of intended software behavior and running-time behavior. It is a hard nut to extract and describe intended software behavior. In our paper, we present a method of extracting and describing of software trajectory based on cross-references of binary file. Our method is thinking from the perspective of the attacker, and constructing suitable size function chain starting at input variables. Then we optimize and simplify of the chain in order to make it practical. Our specific experiment indicates the effectiveness of our way.