期刊文献+

Windows RootKit技术原理及防御策略 被引量:4

Windows RootKit Technology and Protection-Policy
下载PDF
导出
摘要 RootKit是特洛伊木马后门工具,通过修改操作系统软件,使攻击者获得持续的系统访问权并隐藏在计算机中。本文将详细讨论Windows下的RootKit技术原理和检测技术,同时为了保卫系统和网络安全,提出了一套完整的针对RootKit的安全防御策略。 RootKits are Trojan horse backdoor tools that modify operating system software so that an attacker can keep access to and hide on a machine.This article will discuss the principle of Windows RootKit technology and Anti—RootKit technology.To protect the security of system and network,it will presents the protection policy against RootKit.
出处 《微型电脑应用》 2006年第7期4-6,37,共4页 Microcomputer Applications
关键词 WINDOWS ROOTKIT 特洛伊木马后门 防御策略 Windows RootKit Trojan horse backdoor Protection policy
  • 相关文献

参考文献5

  • 1Ed Skoudis,Lenny Zelter.Malware:Fighting Malicious Code[M].Prentice Hall.2003.11
  • 2Greg Hoglund.ROOTKIT[EB/OL].http://www.rootkit.com
  • 3Jan K Rutkowski.Advanced Windows 2000 Rootkit Detection[R].Black Hat Briefings,Las Vegas http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-rutkowski/bh-us-03-rutkowski-paper.pdf July 2003
  • 4sherri sparks,Jamie Butler.Raising The Bar For Windows Rootkit Detection[J/OL].Volume 0x0b,Issue 0x3d http://www.phrack.org/show.php? p = 63&a = 8.2005.08
  • 5[美]JeffreyRichter.Windows核心编程[M].北京:机械工业出版社,2000..

共引文献4

同被引文献17

  • 1司天歌,刘铎,戴一奇.安全的基于网络的计算机系统[J].清华大学学报(自然科学版),2007,47(7):1220-1223. 被引量:26
  • 2Mark E.Russinovich,David A.Solomon.Microsoft Windows Internals,Fourth Edition:Microsoft Windows Server 2003,Windows XP,and Windows 2000[M].Microsoft Press,2004:65-152
  • 3Walter Oney.Programming the Microsoft? Windows Driver Model[M].Microsoft Press,1999:30-124
  • 4Roberto Battistoni,Emanuele Gabrielli,and Luigi V.Mancini.A Host Intrusion Prevention System for Windows Operating Systems[C].ESORICS 2004,LNCS 3193,Springer,2004:pp.352-368.
  • 5Frank Apap,Andrew Honig,Shlomo Hershkop,Eleazar Eskin,and Sal Stolfo.Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses[C].RAID 2002,LNCS 2516,Springer,2002:pp.36-53.
  • 6TCG.TPMsdesign principles V1.2[S].2003.
  • 7TCG.TCG specification architecture overview revision 1.4[S]. 2007.
  • 8David Challener.可信计算[M].赵波,译.北京:机械工业出版社,2009.
  • 9Sean W Smith.可信计算平台:设计与应用[M].冯登国,译.北京:清华大学出版社,2006.
  • 10Intel.Intel trusted execution technology architectural overview [Z].2009.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部