期刊文献+

基于行为特征的BIOS Rootkit检测 被引量:1

BIOS Rootkit Detection Based on Behavior Characteristics
下载PDF
导出
摘要 针对BIOS Rootkit难以检测的问题,提出一种基于行为特征的BIOS Rootkit的检测方法。该方法通过研究BIOS Rootkit工作原理和实现技术,对BIOS Rootkit的行为特征进行归纳、定义和形式化描述,在反编译的过程中提取行为,根据提取的行为构成BIOS Rootkit的完整程度进行恶意性判定。实验结果证明,该方法能够有效检测主流的BIOS Rootkit。 BIOS Rootkit is difficult to detect. Aiming at the problem, this paper proposes a behavior characteristics-based BIOS Rootkits detection method. By studying the BIOS Rootkits' principles and key technologies, this method generalizes, defines and formally describes the behavior characteristics of BIOS Rootkit. Behaviors information is got in decompile phases, and the malicious level is judged according to the rate of a complete BIOS Rootkit lormcd by those behaviors. Experimental results prove that the method is effective to detect BIOS Rootkits.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第2期251-252,255,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01Z434) 河南省重大科技攻关计划基金资助项目(092101210501)
关键词 BIOS安全 逆向工程 恶意代码 BIOS security reverse engineering malware
  • 相关文献

参考文献5

  • 1KasperskyK.Shellcoder编程揭秘[M].罗爱国,郑艳杰,译.北京:电子工业出版,2006.
  • 2Heasman J. Implementing and Detecting a PCI Rootkit[M]. [S. l.]: BlackHat Federal, 2006.
  • 3周振柳,刘宝旭,池亚平,许榕生.计算机BIOS安全风险分析与检测系统研究[J].计算机工程,2007,33(16):114-116. 被引量:13
  • 4傅鹂,向宏,彭毅,刘宇.一种检测BIOS Rootkit的技术[J].重庆工学院学报(自然科学版),2009,23(4):60-64. 被引量:1
  • 5van Emmerik M. Static Assignment for Decompilation: Formal Abstraction of Semantics for Detecting[D]. Brisbane, Australia: University of Queensland, 2007.

二级参考文献9

  • 1Greg H,James B.ROOTKITS-Windows内核的安全防护[M].韩智文,译.北京:清华大学出版社,2007.
  • 2John H.Implementing and Detecting a PCI Rootkit[M].[S.l.]:[s.n.],2006.
  • 3王爽.汇编语言[M].2版.北京:清华大学出版社,2008.
  • 4Intel (R) 64 and IA-32 Architectures Software Developer's Manual Volume 3A:System Programming Guide[k].[S.l.]:Intel Corporation,2008.
  • 5IceLord.BIOS RootKit:Welcome Home,My Lord![eb/ol].[2008-05-06].http://blog.csdn.net/icelord/2007.
  • 6Compaq,Phoenix,Intel.BIOS Boot Specification v1.01[Z].(1996-10).http://www.phoenix.com/NR/rdonlyres/56E38DE2-3E6F-4743-835F-B4A53726ABED/0/specsbbs101.pdf.
  • 7Einarsson S,Rausand M.An Approach to Vulnerability Analysis of Complex Industrial Systems[J].Risk Analysis,1998,18(5):535-546.
  • 8TCG.TCG Specification Architecture Overview v1.2[Z].(2004-08).http://www.trustedcomputinggroup.org/groups/TCG_1_0_Architectu-re_Overview.pdf.
  • 9杨柳.计算机安全:封堵BIOS漏洞[J].瞭望,2004(19):52-53. 被引量:3

共引文献12

同被引文献12

  • 1Charlie Miller. Battery Firmware Hacking: Inside the Innards of a Smart Battery [J]. In Black Hat , 2011.
  • 2John Heasman. Implementing and Detecting an AGPI BIOS Rootkit[J]. In Black Hat DC, 2006.
  • 3John Heasman. Implementing and Detecting an PCI Rootkit [ j ]. In Black Hat DE, 2007.
  • 4Shawn Embleton and Sherri Sparks, SMM Rootkits: A New Breed of OS Independent Malware, Presented at BlackHat USA, I_as Vegas, NV, USA, 2008.
  • 5Equation: The Death Star of Malware Galaxy. http://se- curelist.eom/blog/research/68750/equation -the death-star- of-malware-galaxy/.
  • 6Vasiliadis G, Polychronakis M, Ioannidis S. GPU-Assisted Malware [ J ]. International Journal of Information Security, 2010:1-6.
  • 7杨培,吴灏,金然.BIOS安全防护技术研究[J].计算机工程与设计,2008,29(15):3840-3842. 被引量:13
  • 8池亚平,许盛伟,方勇.BIOS木马机理分析与防护[J].计算机工程,2011,37(13):122-124. 被引量:7
  • 9BMW病毒感染量突破5万 遭全球杀毒厂商围捕[J].电力信息化,2011,9(10):103-103. 被引量:1
  • 10李越,黄春雷.CIH病毒的分析与清除[J].计算机科学,2000,27(5):104-105. 被引量:3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部