Font Size: a A A

Research On Software Plugin-Based Malware Mechanism And Defense Technologies

Posted on:2016-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q LiFull Text:PDF
GTID:2298330467492119Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the information technology develops, computer becomes an indispensible part of people’s work and normal life in the digital age in which some software such as Microsoft Office, Adobe Reader, Google Chrome plays a very important role.As these software increases, so do their corresponding plugins. These plugins vary from one to another and their qualities are rather spotty. On one hand, these plugins can extend the software’s functions, making the software more flexible and convenient for users; On the other hand, the plugin-mechanism’s introduction may contribute to software’s vulnerability. Thus, the criminals are able to compromise a software by making use of a plugin’s vulnerability, to access contents of the files within the software and then steal user’s privacy; Or they can turn a plugin into a Trojan horse to download some other more malicious malware, all these things will have a big threat on users’privacy and property safety. In a word, studying the technology of software plugin-based malware (SPM)’s mechanism and defense technologies will prompt us to investigate the safety of the software from the aspect of its plugins. Only in this way, can we protect our software from misuse in aspect of plugins, making the plugins more safe and healthy.Firstly, this paper introduces the background and current situation of studying of SPM, pointing out that there are very few papers do the research before including home and abroad.Secondly, this paper proposes a malware model based on software plugins, then this paper implements some prototypes of SPM, including Microsoft Office, Adobe Reader and Google Chrome. These prototypes can accomplish some practical and valuable behaviors such as silent installation, download and execute executable files, steal privacy and bypass some mainstream antivirus software and so on.Finally, this paper summarizes these SPMs’ common behaviors and their other differences, proposing some detecting and defending solutions.
Keywords/Search Tags:Software, Plugin, Malware, SPM
PDF Full Text Request
Related items