Computer Science ›› 2008, Vol. 35 ›› Issue (7): 5-8.

Previous Articles     Next Articles

YUAN Yuan DAI Guan-zhong (College of Automation, Northwestern Polytechnical University, Xi'an 710072, China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: LKM backdoors run in kernel as the most dangerous evil code. It is more secluded and stronger than traditional backdoors. This paper analyses the principle and threaten of LKM backdoors. Some detecting methods are researched based on it. These methods hav

Key words: Linux, Loadable kernel modules, Backdoors, System call, Detecting

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!