Computer Science ›› 2010, Vol. 37 ›› Issue (4): 59-.

Previous Articles     Next Articles

Research on Stealth Technology of Windows Kernel-level Rootkits

GONG Guang,LI Zhou-jun,HU Chao-jian,ZOU Yun-ke,LI Zhi-peng   

  • Online:2018-12-01 Published:2018-12-01

Abstract: With more and more attention being paid to the Rootkits technology in the fields of cyber-security, various new Anti-rootkits technologies have emerged continually. Under the detection of various Anti-rootkits tools,the conventional Rootkits stealth technology is difficulty to play its role. Based on systematic analysis and research of traditional kernel-level Rootkits stealth technology,this paper presented a three-in-one rootkits stealth technical architecture on the basis of driver module integral transposition,kernel threads injection and IRP inline Hook in depth. Experimental results show that the Rootkits based on this stealth architecture can well bypass the detection of some well-known Anti-rootkits tools (such as Rootkit Unhooker and IceSword) , which fully demonstrates the effectiveness of this three-in-one Rootkits stealth technical architecture.

Key words: Rootkits, Anti-rootkits, Driver module integral transposition, Kernel threads injection, IRP inline Hook in depth

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!