期刊文献+

Windows内核恶意代码分析与检测技术研究 被引量:6

Research of Analysis and Detection of Malicious Code in Windows Kernel
下载PDF
导出
摘要 Windows内核恶意代码是指能够通过改变Windows执行流程或者改变内核审计和簿记系统所依赖的数据结构等手段以达到隐藏自身,实现恶意功能的程序或程序集,对操作系统安全造成很大的危害。对近年来基于NT内核的微软Windows操作系统下恶意代码主要的隐藏实现技术(包括对进程函数、注册表函数、SSDT等的HOOK行为)进行了深入分析研究,提出了一些具有实用价值的恶意代码检测技术方案。实践表明文中提出的恶意代码分析检测技术在实际中具有积极的指导意义。 Malicious code in Windows kernel is a program or set of programs that an intruder uses to hide her presence and allow malicious actions on a computer system by altering the execution flow of the operating system or manipulating the data set that the operating system relies upon for auditing and bookkeeping, it does great harm to the safe of Windows operating system. Carries on the thorough analysis of main concealing techniques of malicious code ( include every hooking action on process functions, registry functions,SSDT and etc. ) in the Windows operation system based on NT kernel, which has been popular in recent years. Then it propses some schemes on how to detect the malicious code in Windows kernel, practice has showed that the schemes have very high practicality.
作者 左黎明
出处 《计算机技术与发展》 2008年第9期145-147,共3页 Computer Technology and Development
基金 江西省自然科学基金资助项目(0611009) 江西省教育厅支持项目(赣教技2006123) 华东交通大学校立科研基金资助项目(07JC03)
关键词 内核 恶意代码 NATIVE API HOOK kernel malicious code native API HOOK
  • 相关文献

参考文献7

二级参考文献35

  • 1张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43
  • 2王雨,傅鹤岗.挂接系统服务调度表实现对Win2k的访问控制[J].计算机工程与设计,2005,26(2):407-409. 被引量:7
  • 3陈有祺.形式与自动机[M].天津:南开大学出版社,1999.
  • 4George F Luger.人工智能:复杂问题求解的结构和策略[M].第4版.北京:机械工业出版社,2003.
  • 5Christopher Kruegel,William Robertson,Giovanni Vigna.Detecting kernel-level rootkits through binary analysis[EB/OL].20th Annual Computer Security Applications Conference,2004.
  • 6Jan Krzysztof Rutkowski.Advanced Windows 2000 rootkits detection[EB/OL].http://www.blackhat.com/presentations/bh-usa03/bh-us-03-rutkowski/bh-us-03-rutkowski-paper.pdf.
  • 7Hoglund Greg.A *REAL* NT Rootkit,patching the NT kernel[J/OL].Phrack Magazine 55,1999.
  • 8Crazylord.Playing with Windows/dev/(k)mem[J/OL].Phrack Magazine 59,2002.
  • 9Greg H, James B. Rootkits: Subverting the Windows Kernel [ M ]. Addison-Wesley Professional,2005.
  • 10Ntoskrnl. Windows File Protection: How To Disable It On The Fly[EB/OL].(2005 - 10 - 10 ). http://www. egocrew, de/board/archive/3838/thread, html.

共引文献17

同被引文献42

引证文献6

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部