参考文献 [ 1 ] Greg H, James B. Rootkits: Subverting the Windows Kernel[M]. Upper Saddle River,USA:Addison-Wesley Professional,2006. [ 2 ] Li X,Wen Y, Huang M H, et al. An Overview of Bootkit Attacking Approaches[C] / / Proceedings of the 7th International Conference on Mobile Ad-hoc and Sensor Networks. Washington D. C. ,USA:IEEE Press, 2011:428-431. [ 3 ] 张新宇,卿斯汉,马恒太,等. 特洛伊木马隐藏技术研究[J]. 通信学报,2004,25(7):153-159. [ 4 ] Lord I. BIOS Rootkit:Welcome Home,My Lord! [EB/ OL]. (2007-05-11). http:/ / www. xfocus. net / articles/ 200705/ 918. html. [ 5 ] Matrovsov A,Rodionov E, Harlyey D, et al. Bootkit: Exploiting the VBR [EB / OL]. (2011-08-23). http:/ / blog. eset. com / 2011/ 08/ 23/ hasta-la-vista-bootkit-exploiting- the-vbr. [ 6 ] Russinovich M E,Solomon D A,Ionescu A. Windows internals[M]. [S. 1. ]:O'Reilly Media,Inc. ,2012. [ 7 ] Kumar N,Kumar V. VBootKit 2. 0-Attacking Windows 7 via Boot Sectors [C]/ / Proceedings of HITB’09. Dubai, The United Arab Emirates:[s. n. ],2009:216-222. [ 8 ] Matrosov A,Rodionov E. Defeating x64:Modern Trends of Kernel-Mode Rootkits[EB/ OL]. (2011-10-21). http:/ / go. eset. com/ us/ resources/ white-papers/ Ekoparty2011 _ preso. pdf. [ 9 ] Thimbleby H,Anderson S,Cairns P. A Framework for Modelling Trojans and Computer Virus Infection [J]. The Computer Journal,1998,41(7):444-458. [10] 邓立丰. 基于Windows 启动过程的Rootkit 检测技术研究[D]. 成都:西南交通大学,2010. [11] 罗云彬. 琢石成器———Windows 环境下32 位汇编语言程序设计[M]. 北京:电子工业出版社,2009. [12] Stoned Bootkit[EB / OL]. (2010-10-07). http:/ / www. stoned-vienna. com / . 编辑 索书志 |