全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Analyse the Undetectable Behavior of Rootkits on System Services
系统服务Rootkits隐藏行为分析

Keywords: Rootkits,System service,Behavior,Control-flow graph,Data-flow graph,Call graph
rootkits
,系统服务,行为,控制流图,数据流图,函数调用图

Full-Text   Cite this paper   Add to My Lib

Abstract:

Hooking the system services to hide the presence of objects such as processes,files,registry keys,and open ports is the most popular method of rootkits. But a great deal of rootkits detection methods can't tell the relationship between the rootkits and the hided objects. Analyzing the undetectable behavior of user-mode or kernel-mode rootkits on system services,six hide models are built.We develop a method to reveal the object hided by the rootkits when the rootkits are detected through analyzing the binary...

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133