计算机科学 ›› 2011, Vol. 38 ›› Issue (12): 77-81.

• 计算机网络与信息安全 • 上一篇    下一篇

基于VMM的Rootkit及其检测技术研究

周天阳,朱俊虎,王清贤   

  1. (解放军信息工程大学信息工程学院 郑州450002)
  • 出版日期:2018-12-01 发布日期:2018-12-01

Research on VMM-based Rootkit and its Detection Technology

  • Online:2018-12-01 Published:2018-12-01

摘要: 借助虚拟化技术,Rootkit隐藏能力得到极大提升,基于VMM的Rootkit的研究成为主机安全领域的热点。总结了传统Rootkit的隐藏方法和技术瓶颈,介绍了VMM的自身优势和软、硬件实现方法,分析了不同VMM Rootkit的设计原理和运行机制。针对VMM存在性检测的不足,阐述了一种新的VMM恶意性检测思路,同时讨论了 VMM Rootkit的演化方向,并从防护的角度提出了一些安全使用虚拟化技术的建议。

关键词: Rootkit,虚拟机监控器,检测,防护

Abstract: Leveraging virtualization technology, rootkit has improved its stealth capability greatly. Research on VMM based rootkit has become the focus in computer security field. This paper summarized the traditional hidden methods and the bottleneck of the in-box technology, introduced the advantage of VMM at architecture and the implementation based on software and hardware,and then analyzed the design and operation mechanisms of various VMM Rootkits. In order to resolve the limitation of VMM existence detection, it proposed a new method detecting malicious VMM. In addition,this paper discussed the evolvement of VMM Rootkit,and presented how to apply virtualization technictues safely to defend VMM Rootkit.

Key words: Rootkit, VMM, Detection, Defence

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!