期刊文献+

Windows 7遍历PspCidTable表检测隐藏进程 被引量:4

Windows 7 Ergodice PspCidTable to detect hidden Processes
下载PDF
导出
摘要 PspCidTable表保存着所有进程和线程对象的指针,遍历PspCidTable表可以枚举所有进程包括隐藏进程。分析了windows 7的PspCidTable表的结构,论述了windows 7的PspCidTable表的内存地址获取方法,遍历PspCidTable表的算法,最后给出自动检测的实现步骤及方法。在windows 7操作系统上实验表明可高效枚举所有进程,包括通过挂钩枚举进程的函数或进入内核空间直接修改内核数据来达到隐藏自身目的的进程。 PspCidTable preserves all pointer of processes and threads, Ergodicing PspCidTable can enumerate all processes include hidden processes. The paper analyses the structure of windows 7's PspCidTable, expounds the methed to obtain memory address of windows 7's PspCidTable. The algorithm of Ergodicing PspCidTable, finally brings up the step and methed to automatically detect processes. Experiments on windows 7 operation system showed that the algorithm can enumerate all processes with high efficiency, include processes that hooked functions that enumerated processes or directly entered into kernel space changed kernel data to hide self.
出处 《计算机系统应用》 2011年第9期222-225,共4页 Computer Systems & Applications
基金 衢州职业技术学院科研项目(QZYY1023)
关键词 进程 PspCidTable 指针 内核 process PspCidTable pointer Kernel
  • 相关文献

参考文献2

二级参考文献6

  • 1[1]Chris Ries.Inside Windows Rootkits.VigilantMinds Inc Press.2006.
  • 2[2]Greg Hoglund,James Butler.Rootkits:Subverting the Windows Kernel.Addison Wesley Professional Press.2005.
  • 3[3]Prasad Dabak,Milind Borate,Sandeep Phadker.Undocumented Windows NT.M&T Press.1999.
  • 4[4]Mark E.Russinovich,David A.Solomon.Microsoft Windows Internals.Microsoft Press.2004.
  • 5Solomon D A,Russinovich M E.Inside Microsoft Windows2000 (Thrid Edition)[M].美国:微软出版社,2000.
  • 6Microsoft公司.Windows Device Driver Development Kit Design Guide[M].美国:微软出版社,2001.

共引文献6

同被引文献27

  • 1梁晓,李毅超.基于线程调度的进程隐藏检测技术研究[J].计算机科学,2006,33(10):114-115. 被引量:8
  • 2张家旺.Windows系统进程安全保护技术分析和实现[A]襄樊,2007229-235.
  • 3Tsaur Woei Jiunn,Chen Yuh Chen. Exploring rootkit detectors' vulnerabilities using a new Windows hidden driver based rootkit[A].Minneapolis,MN,USA,2010.842-848.
  • 4Fu Desheng;Zhou Shu;Cao Chenglong.A Windows rootkit detection method based on cross-view[A]河南郑州,20101-3.
  • 5Rutkowski J K. Execution path analysis:finding kernel based rootkits[EB/OL].http://www.phrack.org/issues.html? issue =59&id =10#article,2012.
  • 6Wen Yah,Zhao Jinjing,Wang Huaimin. Implicit detection of hidden processes with a local-booted virtual machine[A].Busan,Korea,2008.150-155.
  • 7Alsagoff S N. Malware self protection mechanism[A].Kuala Lumpur,Malaysia,2008.1-8.
  • 8Linxer. XueTr[EB/OL].http://www.xuetr.com/? p =25,2012.
  • 9Amani S I,James H,John G,et al.Cloud Sec:A Security Monitoring Appliance for Virtual Machines in the Iaa S Cloud Model[C]//Proceedings of the 5th International Conference on Network and System Security.Washington D.C.,USA:IEEE Press,2011:113-120.
  • 10Fatemeh A,Micha M,Malak A,et al.Virtual Machine Monitor-based Lightweight Intrusion Detection[J].ACM SIGOPS Operating Systems Review,2011,45(2):38-53.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部