作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (20): 181-183. doi: 10.3969/j.issn.1000-3428.2007.20.063

• 安全技术 • 上一篇    下一篇

基于系统调用挂钩的隐蔽木马程序检测方法

梁 晓,李毅超,崔 甲,曹 跃   

  1. (电子科技大学计算机科学与工程学院网络攻防实验室,成都 610054)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-10-20 发布日期:2007-10-20

Stealthy Trojan Horse Detection Method Based on System Call Hook

LIANG Xiao, LI Yi-chao, CUI Jia, CAO Yue   

  1. (Laboratory of Network Attack & Defense, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-10-20 Published:2007-10-20

摘要: 隐蔽木马程序的设计本质是劫持常规的执行路径流,当前大多数检测手段无法全面检测出隐蔽性日益增强的木马程序。该文结合操作系统程序执行流程的局部相关性与确定性,在分析用户进程空间与内核空间中系统函数调用标志信息的基础上,检测系统中是否存在木马程序设置的隐蔽性系统调用挂钩,设计并实现了相应的检测方法。与现有的检测方法相比,该方案弥补了检测未知木马的不足,检测结果更全面。

关键词: 特洛伊木马, RootKit, 系统调用, 挂钩, 入侵检测

Abstract: Trojan horses design essence lies in hijacking execution routine, and most of current detection methods fail to completely identify such ever-increasingly covert Trojan horses. The paper presents an approach to detect the existence of system call hooks set by Trojan horses based on the locality and determinacy of execution flows, and the analysis of system function call labs in both user and kernel levels, then designs and realizes corresponding prototype. Compared with current detections, the method offsets the deficiency in identifying unknown Trojan horses with more complete detection results.

Key words: Trojan horse, Rootkit, system call, hook, intrusion detection

中图分类号: