期刊文献+

Windows主机键盘记录技术对比分析 被引量:2

Keyboard Monitoring Technology Research based on Windows
下载PDF
导出
摘要 键盘记录技术是最为基础的用户信息窃取技术,也是计算机恶意代码最常使用的技术,在计算机安全检测领域有着重要的意义。文章简述了Windows系统下的键盘信息处理机制,并在此基础上分析总结了基于函数截获的消息HOOK、内核函数HOOK、基于键盘状态检测的应用层键盘扫描、主动轮询这4种典型的键盘记录技术,并通过实验测试了这4种键盘记录技术的查全率、隐蔽性和抗干扰性。实验结果表明,目前主流的4种键盘记录技术查全率均能达到100%,但隐蔽性不足,无法避免主流安全软件的查杀,同时除键盘轮询外其余键盘记录技术不能抵抗主流的防密码窃取机制的干扰。 Keylogger is the most basic computer monitoring technology and is widely used by malicious code, it has important signiifcance in the ifeld of computer security testing. This paper describes the keyboard information processing mechanism on Windows systems, analyzes and summarizes the four kinds of typical keylogger technology:messages HOOK, kernel function HOOK based on function intercept and keyboard scanning, active polling based on keyboard state detection. The experimental results show that the recall of the four kinds of mainstream keylogger technology can reach 100%. But these four keylogger technology lack of imperceptibility, cannot avoided searching and killing of mainstream security software. While in addition to polling the keyboard, the rest kinds of keylogger technology can’t resist the interference of mainstream anti-theft mechanisms.
出处 《信息网络安全》 2014年第6期43-47,共5页 Netinfo Security
基金 国家242计划项目[2005C48] 北京理工大学科技创新计划重大项目[2011CX01015]
关键词 键盘记录 HOOK 中断响应 keylogger HOOK interrupt response
  • 相关文献

参考文献13

二级参考文献57

  • 1刘强,邓亚平,徐震,董世蓉,殷科.隐藏木马检测技术的研究[J].计算机工程,2006,32(1):180-182. 被引量:9
  • 2Black Beast.Message Hook攻与防[J].黑客防线,2006(9):79-83. 被引量:1
  • 3朱若磊.利用核心态钩挂技术防止代码注入攻击[J].计算机应用,2006,26(9):2134-2136. 被引量:8
  • 4Robert Kuster.Three ways to inject your code into another process [EB/OL] .http://www.codeproject.com/threads/winspy.asp, 2003.
  • 5Jeffrey Richter. Programming applications for Microsoft Windows[M].4th Ed.Washington:Microsoft Press,2000:534-541.
  • 6钩子函数的反拦截[EB/OL].http://topic.csdn.net/t/20041031/12/3507600.html.2004.
  • 7Aslam M,Idrees R N,Baig M M,et al.Anti-hook shield against the software key loggers[C].Proe of Nat Conf of Emerging Technologies,2004:189-191.
  • 8Sven Schreiber.Undocumented Windows 2000 secrets:A programmer's cookbook[M].USA:Addison-Wesley,2001:291-349.
  • 9Greg Hoglund, James Butler. ROOTKITS: Subvering the Windows kerne1[M].北京:清华大学出版社,2007:108-127.
  • 10Mark E Russinovich, David A Solomon. Microsoft Windows Internals,Fourth Edition:Microsoft Windows ServiceTM 2003, Windows XP and Windows 2000 [M]. Microsoft Press, 2004.

共引文献32

同被引文献73

  • 1赛门铁克公司.互联网安全威胁报告[EB/OL].2014,19.
  • 2互联网数据中心(DCCI).2013移动隐私安全评测报告[EB/.L]_ 2013.
  • 3BBC News. Hackers crack open mobile network [EB/OL],[2010]. http: //www. bbc. co. uk/news/technology-12094227.
  • 4乌云WooYim. GSM Sniffer 可嗔探短信[EB/OL]. [2012]. ht-tp: ,//www. wooyun. org/bugs/wooyun-2010-011531.
  • 5Holz T, Marechal S, Raynal F. New threats and attacks on theWorld Wide Web [J]. IEEE Security Privacy, 2006,4 (2):72-75.
  • 6Delfina M, Vittorio S. Privacy leakage on the Web: Diffusionand countermeasures [J]. Computer Networks, 2013,57: 2833-2855.
  • 7Privacy in Cloud Computing, ITU-T Technology Watch Report[R]. March 2012.
  • 8Kim E. Cloud Service under the Presence of Privacy Concern[J]. Applied Mathematics Information Science,2014, 8(5):2557-2563.
  • 9Kalloniatis C,Mouratidis H,Vassilis M. Towards the design ofsecure and privacy-oriented information systems in the cloud:I-dentifying the major concepts [J]. Computer Standards In-terfaces .2014,36(4):759-775.
  • 10Corporation S. Internet Security Threat Report (ISTR.) [R.]. California:Symantec Corporation, 2014.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部