期刊文献+

Windows7内核完整性验证机制研究 被引量:2

Kernel Integrity Verification of Windows 7
下载PDF
导出
摘要 Windows 7的内核完整性验证机制使得传统的内核级攻击代码失去作用。针对这一问题,在对系统启动过程中的bootmgr和winload.exe两个文件进行详细分析的基础上,通过修改这两个文件来绕过用于加载内核完整性验证过程的关键函数。测试表明,在获取提升权限的前提下,将上述两个启动文件替换后系统仍然能够正常启动而没有发现异常,说明可以对Windows 7的部分完整性验证机制实现突破。 Windows 7's kernel integrity verification mechanism makes traditional kernel-level attacks useless.To solve this problem,this paper presents detailed analysis of two files in the system boot process,bootmgr and winload.exe.The key functions used to load the integrity verification process are bypassed by modifying these two files.Tests show that when privileges have been elevated,the Windows 7 system is still able to start with no abnormal syptoms found after the replacing of the two files.So with this method,the integrity verification mechanism of Windows 7 is partially broken.
出处 《信息工程大学学报》 2011年第6期764-768,共5页 Journal of Information Engineering University
关键词 逆向分析 WINDOWS7系统 完整性验证 reverse analysis Windows 7 operating system integrity verification
  • 相关文献

参考文献1

二级参考文献5

  • 1Trusted Computing Group. TCG Specification Architecture Overview[EB/OL]. (2004-04-01). http://www.trustedcomputinggroup. org.
  • 2Microsoft Corporation. BitLocker Drive Encryption Technical Overview[EB/OL]. [2010-02-13]. http://technet.microsoft.coirden-us/ library/cc732774.aspx.
  • 3Kumar N, Kumar V. Vbootkit: Compromising Windows Vista Security[C]//Proc. of Black Hat Europe Conference. Amsterdam, the Netherlands: [s. n.], 2007.
  • 4Kumar N, Kumar V. BitLocker and Windows Vista[EB/OL]. (2008-05-19). http://www.nvlabs.irduploads/projects/nvbit/nvbit bit locker__white_paper.pdf.
  • 5陈扬,祝跃飞,梅强.Windows Vista的栈保护机制[J].计算机工程,2008,34(22):182-183. 被引量:3

共引文献5

同被引文献13

  • 1微软官方.Digital signatures for kernel modules on sys-tems running windows vista.
  • 2Skape,Skywing. Bypassing patchguard on windows x64[EB/OL].America:Uninformed,2006.http://uninformed.org/index.cgi?v = 3&a = 3&t=sum ry,2013.
  • 3Skywing. Subverting patch guard version 2[EB/OL].http://www.uninformed.org/?v=6& a=1&t=sumry,2013.
  • 4Skywing. Patch guard reloaded[EB/OL].http://uninformed.o rg/?v=8&a=5&t=sum ry,2013.
  • 5Matthew Conover. Assessment of Windows Vista Ker-nel-mode security[EB/OL].http://www.symantec.com/avcenter/reference/Window s_ Vista _ Kernel_M ode_Security.pdf,2013.
  • 6Fyyre. Disable Patch guard & driver signing on X64 windows 7+ SP1[EB/OL].http://fyyre.ivory-tower.de/projects/no_pg_ds_v3.rar,2013.
  • 7微软官方.Windows 7 code integrity (ci.dll) security policy.
  • 8何志,范明钰,罗彬杰.基于远程线程注入的进程隐藏技术研究[J].计算机应用,2008,28(B06):92-94. 被引量:12
  • 9郜伟,何静.Vista中信任链建立机制研究[J].计算机工程与设计,2009,30(15):3494-3497. 被引量:1
  • 10龚广,李舟军,忽朝俭,邹蕴珂,李智鹏.Windows内核级Rootkits隐藏技术的研究[J].计算机科学,2010,37(4):59-62. 被引量:10

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部