首页 | 本学科首页   官方微博 | 高级检索  
     

木马的植入与隐藏技术分析
引用本文:蔺聪,黑霞丽.木马的植入与隐藏技术分析[J].信息安全与通信保密,2008(7):53-55.
作者姓名:蔺聪  黑霞丽
作者单位:[1]广东商学院教育技术中心,广东广州510520; [2]广东商学院信息学院,广东广州510320
摘    要:论文首先介绍了木马的定义,概括了木马的特征——隐蔽性、欺骗性、自启动性和自动恢复性,并简单介绍了木马的结构和功能。随后,从缓冲区溢出、网站挂马、电子邮件、QQ传播等方面介绍了木马的植入技术,重点从通信隐藏、进程隐藏、文件隐藏三个方面介绍了木马的隐藏技术,最后展望了木马技术的发展趋势。

关 键 词:木马  缓冲区溢出  木马植入  木马隐藏

Analysis on Embedding and Hiding Technologies of Trojan Horse
LIN Cong,HEI Xia-li.Analysis on Embedding and Hiding Technologies of Trojan Horse[J].China Information Security,2008(7):53-55.
Authors:LIN Cong  HEI Xia-li
Affiliation:LIN Cong, HEI Xia-li (1Center of Educational Technology, Guangdong College of Business, Guangzhou Guangdong 510320, China; 21nformation Technology College, Guangdong Business University, Guangzhou Guangdong 510320, China)
Abstract:The definition and character of Trojan horse is discussed first in the text, including concealment, cheat, selfstart and self-recover, and the structure and function of Trojan horse is also described. Then the embedding technologies for Trojan horse, in the fields of buffer overflow, hanging trojan on web, email, QQ, are discussed. The discussion of the hiding technology for Trojan focuses hiding communications, hiding processes and hiding files. Finally, the paper looks into the future trend of Trojan horse.
Keywords:Trojan horse  buffer overflow  embedding technology  hiding technology
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号