期刊文献+

基于直接操作内核对象的进程隐藏技术研究 被引量:6

Research on Process Hiding Technology Based on Direct Kernel Object Manipulation
在线阅读 下载PDF
导出
摘要 分析直接操作内核对象和调用门的实现机制,提出通过使用调用门,在无驱动情况下提升用户程序的特权级,进而修改内核中的进程双向链表实现进程隐藏。设计并实现一个基于该思路的木马程序,在实验条件下验证该木马的隐蔽性和存活能力,分析应对该类型木马的检测策略。实验证明,该木马可以有效实现进程隐藏,躲过常见安全防护软件的检测与查杀。 The realization mechanism of the Direct Kernel Object Manipulation(DKOM) and call gate are analyzed and proposed. By using call gate, it can promote the program's privilege to modify the kernel's process list to hide the process without the driver. A Trojan program is designed and implemented, and the hidden and survival functions are verified in experimental conditions based on the proposal. The experiments have proved that the Trojan can hide the process effectively and escape the detection and killing of the common security software. It also analyzes the Trojan program's detection method.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第18期138-140,共3页 Computer Engineering
基金 江苏省自然科学基金资助项目(BK2007035)
关键词 木马 直接操作内核对象 调用门 进程隐藏 Trojan Direct Kernel Object Manipulation(DKOM) call gate process hiding
  • 相关文献

参考文献6

  • 1杨彦,黄皓.Windows Rootkit隐藏技术研究[J].计算机工程,2008,34(12):152-153. 被引量:14
  • 2王建华,张焕生,侯丽坤.Windows核心编程[M].北京:机械工业出版社,2001.
  • 3Walter O.Programming the Microsoft Windows Driver Model[M].[S.1.] :Microsoft Press,2003.
  • 4MSDN.LIST_ENTRY[EB/OL].(2009-09-16).http://msdn.micro soft.com/en-us/library/aa491571.aspx.
  • 5Greg H,James B.RootKits:Subverting the Windows Kernel[M].[S.1.] :Addison Wesley Professional,2005.
  • 6邓志.x86 & x64沉思录[EB/OL].(2008-12-16).http://linux.chinaunix.net/bbs/thread-1052389-1-1.html.

二级参考文献5

  • 1Hoglund G. The Definition of a Rootkit[DB/OL]. (2006-02-05). http://www.rootkit.com/blog.php?newsid=440.
  • 2Rutkowski J K. Advanced Windows 2000 Rootkit Detection[Z]. (2003-07-01). http://www.blackhat.com/presentations/bh-usa-03/bhus-03-rutkowski/bh-us-03-rutkowski-paper.pdf.
  • 3Butler J, Undercoffer J, Pinkston J. Hidden Processes: The Implication for Intrusion Detection[C]//Proc. of IEEE International Workshop on Information Assurance. New York, USA [s. n,], 2003,
  • 4Skoudis E,Zelter L.决战恶意代码[M].陈贵敏,译.北京:电子工业出版社,2005-04.
  • 5Ries C. Inside Windows Rootkits[Z]. (2006-05-01). http://www. vigilantminds.com/files/inside_windows_rootkits.pdf.

共引文献16

同被引文献29

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部