首页> 外文期刊>Journal of Cyber Security and Mobility >Memory Acquisition by Using Network Card
【24h】

Memory Acquisition by Using Network Card

机译:使用网卡获取内存

获取原文
           

摘要

To detect present rootkit the rootkit and malware detectors need to have memory access. But, sophisticated rootkits are able to subvert the verification process of security scanner using virtual memory subversion techniques to hide their activity. We have proposed a new solution for direct memory access, based on a custom NDIS protocol driver that can send (on request of the local executable program) the contents of the computer memory over the network. Our method allows an unexpected type of the direct memory access, which is independent of the processor, and its control capabilities. This is a strong advantage in rootkit detection, because the rootkit cannot take any action to hide itself while the memory is scanned.
机译:要检测当前的rootkit,rootkit和恶意软件检测器需要具有内存访问权限。但是,复杂的rootkit可以使用虚拟内存颠覆技术来掩盖其活动,从而颠覆安全扫描程序的验证过程。我们已经提出了一种基于直接NDIS协议驱动程序的直接内存访问的新解决方案,该驱动程序可以通过网络发送(应本地可执行程序的请求)计算机内存的内容。我们的方法允许意外类型的直接内存访问,这种访问独立于处理器及其控制功能。这是Rootkit检测的强大优势,因为在扫描内存时,Rootkit无法采取任何措施来隐藏自身。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号