作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (18): 138-140. doi: 10.3969/j.issn.1000-3428.2010.18.047

• 安全技术 • 上一篇    下一篇

基于直接操作内核对象的进程隐藏技术研究

潘茂如,曹天杰   

  1. (中国矿业大学计算机科学与技术学院,江苏 徐州 221116)
  • 出版日期:2010-09-20 发布日期:2010-09-30
  • 作者简介:潘茂如(1985-),男,硕士,主研方向:信息安全,计算机取证;曹天杰,教授、博士生导师
  • 基金资助:
    江苏省自然科学基金资助项目(BK2007035)

Research on Process Hiding Technology Based on Direct Kernel Object Manipulation

PAN Mao-ru, CAO Tian-jie   

  1. (School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China)
  • Online:2010-09-20 Published:2010-09-30

摘要: 分析直接操作内核对象和调用门的实现机制,提出通过使用调用门,在无驱动情况下提升用户程序的特权级,进而修改内核中的进程双向链表实现进程隐藏。设计并实现一个基于该思路的木马程序,在实验条件下验证该木马的隐蔽性和存活能力,分析应对该类型木马的检测策略。实验证明,该木马可以有效实现进程隐藏,躲过常见安全防护软件的检测与查杀。

关键词: 木马, 直接操作内核对象, 调用门, 进程隐藏

Abstract: The realization mechanism of the Direct Kernel Object Manipulation(DKOM) and call gate are analyzed and proposed. By using call gate, it can promote the program’s privilege to modify the kernel’s process list to hide the process without the driver. A Trojan program is designed and implemented, and the hidden and survival functions are verified in experimental conditions based on the proposal. The experiments have proved that the Trojan can hide the process effectively and escape the detection and killing of the common security software. It also analyzes the Trojan program’s detection method.

Key words: Trojan, Direct Kernel Object Manipulation(DKOM), call gate, process hiding

中图分类号: