作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (12): 152-153. doi: 10.3969/j.issn.1000-3428.2008.12.053

• 安全技术 • 上一篇    下一篇

Windows Rootkit隐藏技术研究

杨 彦1,黄 皓1,2   

  1. (1. 南京大学计算机科学与技术系,南京 210093;2. 南京大学软件新技术国家重点实验室,南京 210093)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-06-20 发布日期:2008-06-20

Research on Concealment Technology of Windows Rootkit

YANG Yan1, HUANG Hao1,2   

  1. (1. Dept. of Computer Science and Technology, Nanjing University, Nanjing 210093; 2. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-06-20 Published:2008-06-20

摘要: Rootkit是恶意软件用于隐藏自身及其他特定资源和活动的程序集合。该文分析和研究现有的针对Windows系统的代表性Rookit隐藏技术,将其总结为2类:通过修改系统内核对象数据实现隐藏和通过修改程序执行路径实现隐藏。说明并比较了相应的技术原理,展望了Rootkit隐藏技术未来的发展趋势。

关键词: Windows Rootkit技术, Hook技术, 系统内核, 系统调用, 中断描述符表

Abstract: Rootkit is a program set which malicious software uses to conceal itself and other specific resources and actions. This paper analyzes and researches on the concealment technologies which representative rootkits on Windows platform commonly use, and classifies them into two categories: modifying kernel object data structures and changing execution paths. The technical principles are described and compared in detail. The future development directions are discussed.

Key words: Windows Rootkit technology, Hook technology, system kernel, system call, Interrupt Descriptor Table(IDT)

中图分类号: