期刊文献+

基于虚拟机技术的进程分析方法 被引量:2

Process analyzing method based on virtual machine
下载PDF
导出
摘要 针对现有进程分析方法存在的缺陷,提出了一种在Windows平台虚拟环境下分析进程的方法。该方法首先在宿主机下分析虚拟机的内存,捕捉当前线程,并通过内核数据结构得到当前线程所在进程,然后通过页目录表物理地址计算进程页面,对内存进行清零来结束进程。实例分析表明本方法在保护宿主机安全的同时,能快速监测到程序,并且可以有效地结束进程。 In view of the shortcomings of the existing process analyzing methods,a new method was proposed based on virtual environment of Windows platform.This method captured the current thread by analyzing virtual machine's memory under host,got the current process by the kernel data structures,and set zero among the memory to kill the process.The physical address of memory could be worked out by using the base address of page table.The experimental result shows that the proposed method can quickly detect process,effectively kill the process,and maintain the host security at the same time.
作者 高勇 范明钰
出处 《计算机应用》 CSCD 北大核心 2010年第5期1327-1330,共4页 journal of Computer Applications
基金 国家863计划项目(2009AA01Z403 2009AA01Z435)
关键词 虚拟机 内核 进程 CR3 Virtual Machine (VM) kernel process CR3
  • 相关文献

参考文献13

二级参考文献16

  • 1Thimbleby H,Anderson S,Cairns P.A Framework for Modeling Trojans and Computer Virus Infections.The Computer Journal,1998,41(7):444~458
  • 2Buteler J R Ⅱ.Detecting Compromises of Core Subsystems and Kernel Functions in Windows NT/2000/XP:M.S.Thesis,University of Maryland,Baltimore County,2002
  • 3Butler J,Jeffrey L.Undercoffer and John Pinkston.Hidden Processes:The Implication for Intrusion Detection.In:Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy,West Point,NY,June 2003
  • 4Levine J G,Grizzard J B,Hutto P W,Owen H L.A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table.In:Proceedings of IEEE.SoutheastCon,IEEE,2004.25~31
  • 5Levine J,Grizzard J,Owen H.A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.In:Second IEEE International Information Assurance Workshop,2004
  • 6BUTLER J, JEFFREY L, PINKSON J. Hidden Processes: The Implication for Intrusion Detection[ C]//Proceedings of the 2003 IEEE Workshop on Assurance United States Military Academy, West Point. New York: IEEE Press, 2003.
  • 7王建华,张焕生,侯丽坤.Windows核心编程[M].北京:机械工业出版社,2001.
  • 8SCHREIBER S B Undocumented Windows 2 0 0 0 Secrets : A programmer's cookbook[ M]. Boston: Addison Wesley, 2001.
  • 9GREG H, JAMES B. RootKit: Subverting the Windows Kernel[ M]. Boston: Addison Wesley, 2005.
  • 10RFC 1321, The MD5 Message-Digest Algorithm[S]. 1992.

共引文献25

同被引文献17

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部