期刊文献+

针对Ghost还原的木马隐蔽驻留技术研究 被引量:1

Research on Trojan Horse Hiding and Residence Technology According to Ghost Restoration
原文传递
导出
摘要 Ghost还原系统已经被广泛应用于计算机的系统还原,该技术在使用方便的同时,也存在着安全隐患。文中首先介绍了Ghost映像文件的格式,并阐述其解析的过程和原理。然后在此基础上引出针对Ghost还原系统映像的木马隐蔽驻留技术,并剖析了所实现的Ghost映像文件穿越的命令行工具。该工具读取解析Ghost映像文件,然后往其中写入后门文件来实现木马的隐蔽驻留。最后提出了如何预防和检测利用该方法隐蔽驻留的木马,确保系统还原后的完整和安全。 Ghost reduction system is widely used in the computer system restoration, this technology is easy to use while contains certain safety hidden trouble. This paper first describes Ghost image file format, and tells of its analytical process and principles. And on this basis, this paper draws out the Trojan hiding and residence technology of the Ghost image reduction system, and analyzes the realization of command line tool which can penetrate the Ghost image file. This tool reads and analyzes Ghost image file, and then writes in the back door to their files, thus to realize the Trojan horse hiding and residence. This paper finally puts forth how to prevent and detect the hiding and residing Trojan by this method, and thus to ensure the integrity and safety of restored system.
出处 《信息安全与通信保密》 2012年第1期84-86,共3页 Information Security and Communications Privacy
关键词 Ghost映像文件 读取分析 木马隐蔽 木马驻留 预防与检测 Ghost image file read and analyze Trojan hiding Trojan residence prevention and detection
  • 相关文献

参考文献5

二级参考文献10

  • 1[1]Thompson K. Reflections on Trusting Trust Communications of the ACM,Vol.27-28 Auqust, 1984 pp.172-180.
  • 2[2]John Bowles Computer Viruses. Electrical and Computer Engineering
  • 3[3]Jeffrey Richter Programming Application for Microsoft Windows. Fourth Edition Microsoft Press
  • 4Jeffrey Richter.Advanced Windows third edition.Microsoft Press.
  • 5卢勇焕 郑海允 等.黑客与安全[M].北京:中国青年出版社,2001..
  • 6Richter J.Programming Applications for Microsoft Windows(Fourth Edition).Microsoft Press,2000
  • 7傅赟歆.把特洛伊木马彻底弄明白[EB/OL].http://www.Chinawebfan.com,.
  • 8谢志鹏,陈锻生.多线程模拟3D射击类游戏的设计与实现[J].计算机工程,2000,26(12):178-180. 被引量:5
  • 9谢志鹏,陈锻生.用VC++设计Win32全局钩子[J].计算机应用,2001,21(4):85-87. 被引量:2
  • 10谢志鹏,陈锻生.Windows环境下Client/Server木马攻击与防御分析[J].信息技术,2002,26(5):30-33. 被引量:9

共引文献27

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部