| 1 |
NADIM M, AKOPIAN D, LEE W. A review on learning-based detection approaches of the kernel-level Rootkit[C]//Proceedings of the International Conference on Engineering and Emerging Technologies (ICEET). Washington D.C., USA: IEEE Press, 2022: 1-6.
|
| 2 |
|
| 3 |
CATUOGNO L, GALDI C. Ensuring application integrity: a survey on techniques and tools[C]//Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Washington D.C., USA: IEEE Press, 2015: 192-199.
|
| 4 |
MOON D , PAN S B , KIM I . Host-based intrusion detection system for secure human-centric computing. The Journal of Supercomputing, 2016, 72(7): 2520- 2536.
doi: 10.1007/s11227-015-1506-9
|
| 5 |
OHELLO S P, SUHARD I. Android malware evasion framework for auditing anti-malware resistance against various obfuscation technique and dynamic code loading[C]//Proceedings of the International Conference on Information Technology Systems and Innovation (ICITSI). Washington D.C., USA: IEEE Press, 2022: 183-188.
|
| 6 |
SYED N F , SHAH S W , TRUJILLO-RASUA R , et al. Traceability in supply chains: a cyber security analysis. Computers & Security, 2022, 112, 102536.
|
| 7 |
LI Y G , CHUNG Y C , HWANG K , et al. Virtual wall: filtering Rootkit attacks to protect Linux kernel functions. IEEE Transactions on Computers, 2021, 70(10): 1640- 1653.
doi: 10.1109/TC.2020.3022023
|
| 8 |
NADIM M, LEE W, AKOPIAN D. Kernel-level Rootkit detection, prevention and behavior profiling: a taxonomy and survey[EB/OL]. [2023-07-05]. https://arxiv.org/pdf/2304.00473.
|
| 9 |
MAHAPATRA C , SELVAKUMAR S . An online cross view difference and behavior based kernel Rootkit detector. ACM SIGSOFT Software Engineering Notes, 2011, 36(4): 1- 9.
|
| 10 |
LIANG B, YOU W, SHI W C, et al. Detecting stealthy malware with inter-structure and imported signatures[C]//Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York, USA: ACM Press, 2011: 217-227.
|
| 11 |
WANG Y M, BECK D, VO B, et al. Detecting stealth software with Strider GhostBuster[C]//Proceedings of the International Conference on Dependable Systems and Networks (DSN'05). Washington D.C., USA: IEEE Press, 2005: 368-377.
|
| 12 |
|
| 13 |
|
| 14 |
SUDALAIMUTHU T. Kernel Rootkit secret detection in cloud computing[C]//Proceedings of the 1st International Conference on Computational Science and Technology (ICCST). Washington D.C., USA: IEEE Press, 2023: 276-280.
|
| 15 |
|
| 16 |
WAMPLER D , GRAHAM J H . A normality based method for detecting kernel Rootkits. ACM SIGOPS Operating Systems Review, 2008, 42(3): 59- 64.
doi: 10.1145/1368506.1368515
|
| 17 |
|
| 18 |
WANG Y, HU C M, LI B. VMDetector: a VMM-based platform to detect hidden process by multi-view comparison[C]//Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering. Washington D.C., USA: IEEE Press, 2011: 307-312.
|
| 19 |
XIE X W, WANG W C. Rootkit detection on virtual machines through deep information extraction at hypervisor-level[C]//Proceedings of the IEEE Conference on Communications and Network Security (CNS). Washington D.C., USA: IEEE Press, 2013: 498-503.
|
| 20 |
VÖMEL S, LENZ H. Visualizing indicators of Rootkit infections in memory forensics[C]//Proceedings of the 7th International Conference on IT Security Incident Management and IT Forensics. Washington D.C., USA: IEEE Press, 2013: 122-139.
|
| 21 |
XIAO J D, LU L, WANG H N, et al. HyperLink: virtual machine introspection and memory forensic analysis without kernel source code[C]//Proceedings of the IEEE International Conference on Autonomic Computing (ICAC). Washington D.C., USA: IEEE Press, 2016: 127-136.
|
| 22 |
HUA Q, ZHANG Y. Detecting malware and Rootkit via memory forensics[C]//Proceedings of the International Conference on Computer Science and Mechanical Automation (CSMA). Washington D.C., USA: IEEE Press, 2016: 92-96.
|
| 23 |
|
| 24 |
LAMPS J, PALMER I, SPRABERY R. WinWizard: expanding Xen with a LibVMI intrusion detection tool[C]//Proceedings of the 7th IEEE International Conference on Cloud Computing. Washington D.C., USA: IEEE Press, 2014: 849-856.
|
| 25 |
ZAKI A , HUMPHREY B . Unveiling the kernel: Rootkit discovery using selective automated kernel memory differencing. Virus Bulletin, 2014, 12, 239- 256.
|
| 26 |
|
| 27 |
CASE A , RICHARD G G . Advancing Mac OS X Rootkit detection. Digital Investigation, 2015, 14, S25- S33.
doi: 10.1016/j.diin.2015.05.005
|
| 28 |
|
| 29 |
ZHOU H W , SHI W C , YUAN J H , et al. BeCFI: detecting hidden control flow with performance monitoring counters. International Journal of High Performance Computing and Networking, 2016, 9(5/6): 470- 479.
doi: 10.1504/IJHPCN.2016.080420
|
| 30 |
LI Y G , WU Y , CUI C Y , et al. RMVP: a real-time method to monitor random processes of virtual machine. IEEE Access, 2019, 7, 15845- 15860.
doi: 10.1109/ACCESS.2019.2893627
|
| 31 |
QUYNH N A, TAKEFUJI Y. Towards a tamper-resistant kernel Rootkit detector[C]//Proceedings of the 2007 ACM Symposium on Applied Computing. New York, USA: ACM Press, 2007: 276-283.
|
| 32 |
CONNELLY J, ROBERTS T, GAO X, et al. CloudSkulk: a nested virtual machine based Rootkit and its detection[C]//Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Washington D.C., USA: IEEE Press, 2021: 350-362.
|
| 33 |
MANōS V J M , JANG D , RYU C , et al. Domain isolated kernel: a lightweight sandbox for untrusted kernel extensions. Computers & Security, 2018, 74, 130- 143.
|
| 34 |
NAGY R , NÉMETH K , PAPP D , et al. Rootkit detection on embedded IoT devices. Acta Cybernetica, 2021, 25(2): 369- 400.
doi: 10.14232/actacyb.288834
|
| 35 |
BRAVO P , GARCÍA D F . Rootkits survey. Architecture, 2011, 6, 7.
|
| 36 |
LI X Y, ZHANG Y, TANG Y. Kernel malware core implementation: a survey[C]//Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. Washington D.C., USA: IEEE Press, 2015: 9-15.
|
| 37 |
RUDD E M , ROZSA A , GVNTHER M , et al. A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Communications Surveys & Tutorials, 2017, 19(2): 1145- 1172.
|
| 38 |
时金桥, 方滨兴, 胡铭曾, 等. Linux系统调用劫持: 技术原理、应用及检测. 计算机工程与应用, 2003, 39(32): 167- 170.
|
|
SHI J Q , FANG B X , HU M Z , et al. Linux system call hijacking: technical principles, application and detection. Computer Engineering and Applications, 2003, 39(32): 167- 170.
|
| 39 |
|
| 40 |
PRAKASH A, VENKATARAMANI E, YIN H, et al. Manipulating semantic values in kernel data structures: attack assessments and implications[C]// Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Washington D.C., USA: IEEE Press, 2013: 1-12.
|
| 41 |
|
| 42 |
刘刚, 徐峥, 崔士伟. KVM环境下内核级Rootkit检测及防护技术研究. 信息安全研究, 2019, 5(7): 616- 622.
|
|
LIU G , XU Z , CUI S W . Research on technologies of kernel Rootkit detecting and protecting in KVM environment. Journal of Information Security Research, 2019, 5(7): 616- 622.
|
| 43 |
王丽娜, 高汉军, 刘炜, 等. 利用虚拟机监视器检测及管理隐藏进程. 计算机研究与发展, 2011, 48(8): 1534- 1541.
|
|
WANG L N , GAO H J , LIU W , et al. Detecting and managing hidden process via hypervisor. Journal of Computer Research and Development, 2011, 48(8): 1534- 1541.
|
| 44 |
赵鲲鹏, 苏葆光. Linux内存管理中的Slab分配机制. 现代计算机, 2006(5): 89- 91.
|
|
ZHAO K P , SU B G . Slab assigning mechanism in memory management of Linux. Modern Computer, 2006(5): 89- 91.
|
| 45 |
蔡梦娟. 基于VMM的虚拟机隐藏网络连接检测研究. 现代计算机, 2019(33): 15- 18.
|
|
CAI M J . Research on virtual machine hidden network connections detection based on VMM. Modern Computer, 2019(33): 15- 18.
|
| 46 |
文伟平, 陈夏润, 杨法偿. 基于Rootkit隐藏行为特征的Linux恶意代码取证方法. 信息网络安全, 2020(11): 32- 42.
|
|
WEN W P , CHEN X R , YANG F C . Malicious code forensics method based on hidden behavior characteristics of Rootkit on Linux. Netinfo Security, 2020(11): 32- 42.
|
| 47 |
|
| 48 |
乌云, 李平, 李勇钢. 基于虚拟机自省的隐藏文件检测方法. 计算机系统应用, 2016, 25(1): 175- 180.
|
|
WU Y , LI P , LI Y G . Method of hidden file detection based on virtual machine introspection. Computer Systems & Applications, 2016, 25(1): 175- 180.
|
| 49 |
|