期刊文献+

检测Linux下的VFS型内核后门软件 被引量:2

Detecting VFS Kernel Backdoor Software in Linux
下载PDF
导出
摘要 近年来在Linux操作系统中出现了入侵Linux内核VFS(虚拟文件系统)驱动程序的后门技术。使用该技术的后门软件能逃脱所有现有的后门检测技术,给Linux系统的安全带来了极大危害。通过分析该后门技术和Linux内核,设计实现了对该类后门软件的检测技术,其效果好于现有的后门检测软件。 A new backdoor technology which intrudes VFS (Virtual Filesystem Switch) driver of Linux kernel was introduced two years ago. With it, backdoor software can escape from being detected by existing technology and impair the security of Linux system greatly. Analyzed this technology and Linux kernel, designed and implemented a detecting technology for this kind of backdoor software. The detecting technology is better than existing backdoor detecting software.
出处 《计算机应用研究》 CSCD 北大核心 2005年第5期194-196,213,共4页 Application Research of Computers
关键词 LINUX内核 信息安全 后门软件 VFS Linux Kernel Information Security Backdoor Software VFS
  • 相关文献

参考文献15

  • 1.Zer 9.如何创建后门[EB/OL].http://www.nsfocus.net/index.php act=sec_selfdo=viewdoc_id=13,2004-03-10.
  • 2.Backend.后门技巧[EB/OL].http://www.nsfocus.net/index.phpact=sec_selfdo=viewdoc_id=219,2004-03-10.
  • 3Plaguez.Weakening the Linux Kernel[EB/OL].www.phrack.org, 1998-01-26/2004-03-11.
  • 4书生.检测LKM rootkit[EB/OL].http://www.linuxaid.com.cn/articles/3/1/312050615.shtml,2004-03-10.
  • 5Jbtzhm.module的隐藏[EB/OL].http://www.nsfocus.net/index.php act=sec_selfdo=viewdoc_id=714,2004-03-10.
  • 6Sd & Devik.Linux on-the-fly kernel patching without LKM[EB/OL]. www.phrack.org, 2001-12-28/2004-03-11.
  • 7Palmers.Advances in Kernel Hacking[EB/OL].www.phrack.org, 2001-12-28/2004-03-11.
  • 8Truff.Infecting Loadable Kernel Modules[EB/OL].www.phrack.org, 2003-08-13/2004-03-11.
  • 9毛德操 胡希明.Linux内核源代码情景分析(下册)[M].杭州:浙江大学出版社,2001.134-178.
  • 10Alessandro Rubini,et al.Linux Device Drivers (2nd Edition)[M].Sebastopol:O'Reilly & Associates, Inc., 370-373.

共引文献16

同被引文献13

  • 1王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 2夏耐,林志强,茅兵,谢立.隐蔽通道发现技术综述[J].计算机科学,2006,33(12):1-5. 被引量:5
  • 3Andreas B.Unix and Linux-based Rootkits Techniques and Countermeasures[Z].(2004-04-30).http://www.first.org/confe-rence/2004/papers/c17.pdf.
  • 4Alisa S.Rootkit Evolution[Z].(2008-08-28).http://www.viruslist.com/en/analysis?pubid=204792016.
  • 5Samhain Labs.Detecting Kernel Rootkits[Z].(2003-06-17).http:// www.ists.dartmouth.edu/library/409.pdf.
  • 6Adore-ng[Z].(2004-03-25).http://stealth.7350.org/rootkits/adore-ng-0.56.tgz.
  • 7Kolter Jeremy Z,Maloof Marcus A.Leaming to detect and classify malicious executables in the wild [C].Seattle,WA,USA: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2004:2721-2744.
  • 8Lyda, Robert. Using entropy analysis to find encrypted and packed Malware[J].IEEE Security and Privacy,2007,5(2):40-45.
  • 9Piergiorgio Di Giacomo.COTS and open source software components: are they really different on the battlefield?[C].Bilbao,Spain: 4th International Conference on COTS-Based Software Systems, 2005:301-310.
  • 10Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments [S].OIML TC5/SC2/N7,2006.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部