首页> 外文会议>International conference on security management >Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit
【24h】

Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit

机译:使用新的基于Windows隐藏驱动程序的Rootkit识别Rootkit感染

获取原文

摘要

It can be observed that most sophisticated kernel mode rootkits implement hiding tasks via loading drivers in Windows. Also, more and more malware writers are taking advantage of rootkits to shield their illegal activities. Therefore, the role of a detector for effectively detecting Windows driver-hidden rootkits is becoming extremely important. In our previous work, we focused on developing a new Windows driver-hidden rootkit with five tricks based on the technique of DKOM (Direct Kernel Object Manipulation), which has verified that it can successfully avoid a variety of well-known rootkit detectors. In this paper, we extend our previous work by employing what we learn from the proposed new driver-hidden rootkit to explore remedies and solution for identifying not only the new threat but also other existing rootkits. It is expected that this research will contribute to the development of rootkit detection methods for unknown Windows hidden-driver-based rootkits.
机译:可以看出,大多数复杂的内核模式rootkit通过在Windows中加载驱动程序来实现隐藏任务。而且,越来越多的恶意软件编写者正在利用rootkit来屏蔽其非法活动。因此,用于有效检测Windows驱动程序隐藏的rootkit的检测器的作用变得极为重要。在我们之前的工作中,我们基于DKOM(直接内核对象操纵)技术,着重开发了具有五个技巧的新的Windows驱动程序隐藏的rootkit,这证明了它可以成功避免各种著名的rootkit检测器。在本文中,我们通过利用从提议的新的隐藏驱动程序的rootkit中汲取的经验来扩展以前的工作,以探索不仅可以识别新威胁而且可以识别其他现有rootkit的补救措施和解决方案。预期这项研究将有助于开发未知的基于Windows隐藏驱动程序的rootkit的rootkit检测方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号