计算机科学 ›› 2010, Vol. 37 ›› Issue (4): 59-.

• 计算机网络与信息安全 • 上一篇    下一篇

Windows内核级Rootkits隐藏技术的研究

龚广,李舟军,忽朝俭,邹蕴坷,李智鹏   

  1. (北京航空航天大学计算机学院 北京100191),(海军装备研究院 北京100161)
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(60473057,90604007,90718017)和教育部博士点基金(20070006055)资助。

Research on Stealth Technology of Windows Kernel-level Rootkits

GONG Guang,LI Zhou-jun,HU Chao-jian,ZOU Yun-ke,LI Zhi-peng   

  • Online:2018-12-01 Published:2018-12-01

摘要: 随着Rootkits技术在信息安全领域越来越受到重视,各种Anti-rootkit s新技术不断出现。在各种Anti-rootkits工具的围剿下,常规的Rootkits隐藏技术难以遁形。在系统分析和深入研究传统内核级Rootkits隐藏技术的基础上,提出了一个集驱动模块整体移位、内核线程注入、IRP深度内联Hook 3种技术为一体的Root kit s隐藏技术体系。实验结果显示,基于该隐藏技术体系所实现的Rootkits能够很好地躲避专业的Anti-rootkits工具(如Rootkit Unhookc

关键词: Rootkits , Anti-rootkits ,驱动模块整体移位,内核线程注入,IRP深度内联Hook

Abstract: With more and more attention being paid to the Rootkits technology in the fields of cyber-security, various new Anti-rootkits technologies have emerged continually. Under the detection of various Anti-rootkits tools,the conventional Rootkits stealth technology is difficulty to play its role. Based on systematic analysis and research of traditional kernel-level Rootkits stealth technology,this paper presented a three-in-one rootkits stealth technical architecture on the basis of driver module integral transposition,kernel threads injection and IRP inline Hook in depth. Experimental results show that the Rootkits based on this stealth architecture can well bypass the detection of some well-known Anti-rootkits tools (such as Rootkit Unhooker and IceSword) , which fully demonstrates the effectiveness of this three-in-one Rootkits stealth technical architecture.

Key words: Rootkits, Anti-rootkits, Driver module integral transposition, Kernel threads injection, IRP inline Hook in depth

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!