%0 Journal Article
%T Analyse the Undetectable Behavior of Rootkits on System Services
系统服务Rootkits隐藏行为分析
%A LONG Hai
%A HAO Dong-bai
%A HUANG Hao
%A
龙海
%A 郝东白
%A 黄皓
%J 计算机科学
%D 2008
%I
%X Hooking the system services to hide the presence of objects such as processes,files,registry keys,and open ports is the most popular method of rootkits. But a great deal of rootkits detection methods can't tell the relationship between the rootkits and the hided objects. Analyzing the undetectable behavior of user-mode or kernel-mode rootkits on system services,six hide models are built.We develop a method to reveal the object hided by the rootkits when the rootkits are detected through analyzing the binary...
%K Rootkits
%K System service
%K Behavior
%K Control-flow graph
%K Data-flow graph
%K Call graph
rootkits
%K 系统服务
%K 行为
%K 控制流图
%K 数据流图
%K 函数调用图
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=06803EDCB590EEFEFDF68A6AF2C0DEDA&yid=67289AFF6305E306&vid=6209D9E8050195F5&iid=B31275AF3241DB2D&sid=89F76E117E9BDB76&eid=F24949CFDB502409&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=12