期刊文献+

一种基于硬件虚拟化的Rootkit技术 被引量:2

A Rootkit Based on Hardware Virtualization
下载PDF
导出
摘要 针对当前Windows x64版本的内核保护技术,提出一种基于硬件虚拟化的内核Rootkit技术,该技术利用Intel VT-x硬件虚拟化技术将客户系统(Guest OS)迁移到VMM之上运行实现Rootkit。借鉴Shadow Walker内存隐藏思想,基于扩展页表技术对客户系统的不同内存操作映射不同的物理内存,实现隐藏Rootkit代码,对内核保护研究有一定的启发意义。实验证明该技术稳定性强,能够绕过内核保护机制实现内核Rootkit。 To bypass the Kernel Patch Protection of Windows x64, puts forward a kernel Rootkit technology based on hardware virtualization, which migrates the Guest OS to VMM to achieve kernel Rootkit by Intel VT-x hardware virtualization technology. Inspired by the Shadow Walker, uses the EPT technology to hide rootkit code by mapping different physical memory to different Guest OS memory operations, it has some enlightening significance to the study of kernel protection. Experiments show that the method is robust and can bypass the Ker-nel Patch Protection and achieve kernel Rootkit.
出处 《现代计算机(中旬刊)》 2017年第2期21-25,共5页 Modern Computer
关键词 内核保护 硬件虚拟化 内核Rootkit 扩展页表 Kernel Patch Protection Hardware Virtualization Kernel Rootkit EPT
  • 相关文献

参考文献5

二级参考文献106

  • 1孙淑华,马恒太,卿斯汉.内存映射型内核级木马的研究与改进[J].微电子学与计算机,2004,21(11):15-19. 被引量:1
  • 2辛晓慧.Xen内存虚拟化实现[J].开放系统世界,2006(11):103-107. 被引量:2
  • 3King S T, Chen P M, Wang Y, et al. SubVirt: Implementing malware with virtual machines[C]//Proceedings of the 2006 IEEE Symposium on Security and Privacy. Oakland, CA, 2006.
  • 4Rutkowska J. Subverting Vista Kernel For Fun And Profit[C]//Black Hat USA 2006. Caesars Palace, Las Vegas, 2006.
  • 5Zovi D A D. Hardware Virtualization-Based Rootkits[ C].//Black Hat USA 2006. Caesars Palace, Las Vegas, 2006.
  • 6Intel 64 and IA -32 Architectures Software Developer's Manual Volume 3B: System Programming Guide, Part 2[ EB/OL]. ( 2000 - 03 - 07 ) [ 2009 - 02 - 271- http ://download. intel, com/design/processor/manuals/253669, pdf.
  • 7AMD64 Architecture Programmer's Manual Volume 2 : System Programming[ EB/OL]. (2001 - 02 - 21 ) [ 2009 - 02 - 27 ]. http://www.amd.com/us-en/assets/content_type/white_papers and tech docs/24593, pdf.
  • 8Hoglund G, Butler J. Rootkits: Subverting the Windows Kernel[ M]. Beijing:Osinghua University Press, 2007.
  • 9Rutkowska J. Introducing Stealth Malware Taxonomy [ EB/OL ]. (2003 -04 -09 ) [ 2009 -02 -21 ]. http ://www. invisiblethings, org/papers/malware-taxonomy.pdf.
  • 10HackerDefender[ EB/OL ]. ( 2004 - 07 - 10) [ 2009 - 01 - 10 ]. http ://vii. nai. corn/ vii/ content/v_100035, htm.

共引文献24

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部