Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Su Purui is active.

Publication


Featured researches published by Su Purui.


international conference on information security and cryptology | 2010

DepSim: a dependency-based malware similarity comparison system

Yang Yi; Ying Lingyun; Wang Rui; Su Purui; Feng Dengguo

It is important for malware analysis that comparing unknown files to previously-known malicious samples to quickly characterize the type of behavior and generate signatures. Malware writers often use obfuscation, such as packing, junk-insertion and other means of techniques to thwart traditional similarity comparison methods. In this paper, we introduce DepSim, a novel technique for finding dependency similarities between malicious binary programs. DepSim constructs dependency graphs of control flow and data flow of the program by taint analysis, and then conducts similarity analysis using a new graph isomorphism technique. In order to promote the accuracy and antiinterference capability, we reduce redundant loops and remove junk actions at the dependency graph pre-processing phase, which can also greatly improve the performance of our comparison algorithm. We implemented a prototype of DepSim and evaluated it to malware in the wild. Our prototype system successfully identified some semantic similarities between malware and revealed their inner similarity in program logic and behavior. The results demonstrate that our technique is accurate.


Archive | 2013

Method and system for testing malicious Android application programs

Jiao Sibei; Su Purui; Ying Lingyun; Yang Yi


Journal of Software | 2003

A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming

Su Purui; Li De-Quan; Feng Dengguo


Journal of Software | 2012

Semantics-Based Malware Behavior Signature Extraction and Detection Method

Wang Rui; Feng Dengguo; Yang Yi; Su Purui


Journal of Software | 2012

MapReduce-Based Large-Scale Online Social Network Worm Simulation

He Liang; Feng Dengguo; Wang Rui; Su Purui; Ying Lingyun


Archive | 2015

Credible method and system for protecting confidentiality of database

Li Hao; Feng Dengguo; Zhang Zhenfeng; Zhang Min; Su Purui; Qin Yu; Chi Jialin; Chen Zhenyu


Archive | 2013

Network protocol analysis method of malicious code

Wang Minghua; Nie Meining; Yang Yi; Su Purui; Ying Lingyun


Archive | 2013

Malicious code online analysis method based on hardware simulator and system thereof

Cheng Yao; Wang Rui; Su Purui; Feng Dengguo; Yang Yi; Nie Meining


Archive | 2013

Fuzz optimization method based on file format

Nie Meining; Wang Minghua; Yang Yi; Su Purui


Acta Electronica Sinica | 2012

Communication Protocol Reverse Engineering of Malware Using Dynamic Taint Analysis

Liu Yu; Wang Minghua; Su Purui; Feng Dengguo

Collaboration


Dive into the Su Purui's collaboration.

Top Co-Authors

Avatar

Feng Dengguo

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Ying Lingyun

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yang Yi

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wang Rui

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Li De-Quan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Qin Yu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhang Zhenfeng

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge