期刊文献+

基于磁盘隐藏PE文件搜索的Bootkit检测方法 被引量:1

Bootkit Detection Method Based on Disk Hidden PE File Searching
下载PDF
导出
摘要 Bootkit通过将加载时间点提前到引导阶段,能够对其操作系统下的恶意行为进行隐藏以绕过多数安全软件。为此,对Bootkit的动态行为隐藏机制进行形式化建模,扩展协同隐藏机制以揭示Bootkit高隐蔽性,并且利用大部分Bootkit在磁盘上隐藏恶意PE文件的特点,设计并实现一种PE文件匹配算法。实验结果表明,该算法在磁盘隐蔽扇区中匹配特定的模式串以寻找潜在的恶意PE文件,在针对Bootkit样本的检测中取得了较好效果。 Bootkit originates from Rootkit and can bypass most security software through loading the malicious code during windows booting period. This paper uses formal description to depict the procedure of malicious operation hiding and develops the cooperative concealment. Because most Bootkit hide malicious PE files in disks, a PE matching algorithm is designed and implemented. This algorithm will search some byte sequences with specific pattern to find potential hidden PE files and experiments show that this algorithm can gain a high detecting accuracy towards some Bootkit samples.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第6期116-120,共5页 Computer Engineering
基金 国家自然科学基金资助项目"云计算环境下软件可靠性和安全性理论 技术与实证研究"(61332010)
关键词 恶意行为 协同隐藏 形式化描述 PE文件 静态检测 malicious behavior cooperative concealment formal description PE file static detection
  • 相关文献

参考文献10

  • 1Greg H,James B.Rootkits:Subverting the Windows Kernel[M].Upper Saddle River,USA:Addison-Wesley Professional,2006.
  • 2Li X,Wen Y,Huang M H,et al.An Overview of Bootkit Attacking Approaches[C]//Proceedings of the7th International Conference on Mobile Ad-hoc and Sensor Networks.Washington D.C.,USA:IEEE Press,2011:428-431.
  • 3张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43
  • 4Lord I.BIOS Rootkit:Welcome Home,My Lord![EB/OL].(2007-05-11).http://www.xfocus.net/articles/200705/918.html.
  • 5Matrovsov A,Rodionov E,Harlyey D,et al.Bootkit:Exploiting the VBR[EB/OL].(2011-08-23).http://blog.eset.com/2011/08/23/hasta-la-vista-bootkit-exploiting-the-vbr.
  • 6Russinovich M E,Solomon D A,Ionescu A.Windows internals[M].[S.1.]:O'Reilly Media,Inc.,2012.
  • 7Kumar N,Kumar V.VBoot Kit2.0-Attacking Windows7via Boot Sectors[C]//Proceedings of HITB’09.Dubai,The United Arab Emirates:[s.n.],2009:216-222.
  • 8Matrosov A,Rodionov E.Defeating x64:Modern Trends of Kernel-Mode Rootkits[EB/OL].(2011-10-21).http://go.eset.com/us/resources/white-papers/Ekoparty2011_preso.pdf.
  • 9Thimbleby H,Anderson S,Cairns P.A Framework for Modelling Trojans and Computer Virus Infection[J].The Computer Journal,1998,41(7):444-458.
  • 10Stoned Bootkit[EB/OL].(2010-10-07).http://www.stoned-vienna.com/.

二级参考文献9

  • 1ADLEMAN L M. An abstract theory of computer viruses[A]. 8th Annual International Cryptology Conference[C]. Santa Barbara, California, USA, 1988.
  • 2COHEN F. Computer viruses: theory and experiments[J]. Computers and Security, 1987, 6(1): 22-35.
  • 3COHEN F. On the implications of computer viruses and methods of defense[J]. Computers and Security, 1988, 7(2):167-184.
  • 4COHEN F. A Cryptographic checksum for integrity protection[J]. Computers and Security, 1987, 6(6): 505-510.
  • 5COHEN F. Models of practical defenses against computer viruses[J]. Computers and Security, 1989, 8(2): 149-160.
  • 6THIMBLEBY H, ANDERSON S, CAIRNS P. A framework for modelling trojans and computer virus infection[J]. The Computer Journal, 1998, 41(7): 444-458.
  • 7THOMPSON K. Reflections on trusting trust[J]. Communication of the ACM, 1984, 27(8): 761-763.
  • 8EGGERS K W, MALLETT P W. Characterizing network covert storage channels[A]. Aerospace Computer Security Applications Conference[C]. Orlando, FL, USA, 1988.
  • 9AHSAN K, KUNDUR D. Practical data hiding in TCP/IP[A]. Proc Workshop on Multimedia Security at ACM Multimedia[C]. French Riviera, 2002.

共引文献42

同被引文献6

  • 1侯捷.深入浅出MFC[M].北京:华中理工大学出版社,1996.
  • 2郭涛涛.另类的反调试[J].黑客防线,2011,2(3):3-5.
  • 3Elias Bachaalany.Detect if your program is running inside a Virtual Machine [EB/OL].(2005-04)http://www.codeproject.com/.
  • 4Eldad Eilam,Elliot Chikofsky.Reversing Secrets of Reverse Engineering [M].Electronic industry Press,2007.
  • 5朱耀麟,张勇,孟超.爆炸环境激光通信信道研究[J].西安工程大学学报,2013,27(1):55-59. 被引量:2
  • 6赵雨辰,万国宾.多针状氧化锌晶须的等效电磁建模及仿真[J].西安工业大学学报,2014,34(6):498-503. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部