期刊文献+

基于DLL的特洛伊木马隐藏技术研究 被引量:6

Research on the concealing technology of Trojan horse based on DLL
下载PDF
导出
摘要 隐藏技术一直是木马设计人员研究的重要技术。在分析原有木马隐藏方法的基础上,提出了使用动态链接库(DLL)与线程技术相结合的木马进程隐藏方案,用动态链接库编程技术代替传统木马程序,并用线程嫁接技术将其植入目标进程,具有很好的隐蔽性和灵活性。 Concealing technology is important to designer of Trojan horses all through. Based on the study of the existing concealing technology of Trojan horses, a new scheme is presented to realize the injection of Trojan horse by combining the technology of dynamic linking library with the remote thread injection. The idea of replacing traditional Trojan horse program with DLL and the notion of injection of DLL by use of remote thread are proposed. It is rather safe and flexible to inject Trojan horse by adopting this scheme.
出处 《信息技术》 2005年第12期41-43,47,共4页 Information Technology
关键词 特洛伊木马 动态链接库 远程线程 隐藏技术 Trojan horse dynamic link library remote thread concealing technology
  • 相关文献

参考文献6

二级参考文献20

  • 1Pelaez C E, Bowles J.Computer viruses, System Theory,1991. Proceedings., Twenty-Third Southeastern Symposium on, 10-12 Mar 1991.
  • 2Backdoors and Trojan Horses: By the Internet Security Systems' X-Force, Information Security Technical Report,Volume 6, Issue 4, 1 December 2001.
  • 3Viruses, Worms, Trojan :http://tennis.ecs.umass.edu/-czou/link/security_course, 2002.
  • 4Oktay Ahunergil., Understanding Rootkits, 12/14/2001http://linux.oreillynet.com/pub/a,/linux/2001 / 12/14/rootkit.html.
  • 5Andrew R. Jones, A Review of Loadable Kernel Modules June 12, 2001 http://www.xsecurity.ws/documentacao/papers/geral/kemel_mods.html.
  • 6Stealth, htt p://www.team-teso.net/releases/adore -0.34.tgz,2003.
  • 7Pragmatic/THC ,Complete Linux Loadable Kernel Modules, version 1.0, 03/1999 http://packetstormsecurity.nL/docs/hack/ LKM_HACKING.html.
  • 8Toby Miller,.Detecting Loadable Kernel Modules(LKM), 2000 .http://www.incident-response.org/LKM.htm.
  • 9Y Zhang, and V Paxson. Detecting Backdoors, In 9th USENIX Security Symposium, Aug. 2000.
  • 10ADLEMAN L M. An abstract theory of computer viruses[A]. 8th Annual International Cryptology Conference[C]. Santa Barbara, California, USA, 1988.

共引文献71

同被引文献19

引证文献6

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部