首页 | 本学科首页   官方微博 | 高级检索  
     

基于符号执行的内核级Rootkit静态检测
引用本文:易宇,金然.基于符号执行的内核级Rootkit静态检测[J].计算机工程与设计,2006,27(16):3064-3068.
作者姓名:易宇  金然
作者单位:解放军信息工程大学,信息工程学院,河南,郑州,450002
摘    要:Rootkit是攻击者用来隐藏踪迹和保留访问权限的工具集.加载入系统内核的内核级Rootkit使得操作系统本身变得不可信任,造成极大安全隐患.构建了一个完整的通过静态分析检测内核级Rootkit的模型,构造了描述Rootkit行为的普遍适用的定义并证明了其充分必要性,采用符号执行法进行静态分析,利用污点传播机制,针对模型特点对分析过程进行优化.基于这个模型的内核级Rootkit检测具有高准确性和较好的前瞻性.

关 键 词:Rootkit检测  静态分析  符号执行  污点传播
文章编号:1000-7024(2006)16-3064-05
收稿时间:2005-06-17
修稿时间:2005-06-17

Kernel-level Rootkit detection model based on static analysis
YI Yu,JIN Ran.Kernel-level Rootkit detection model based on static analysis[J].Computer Engineering and Design,2006,27(16):3064-3068.
Authors:YI Yu  JIN Ran
Abstract:Rootkit that hide trace and preserve accessing popedom by attacker is a collection of utility. The Rootkit which can be load into the system kernel, called kernel Rootkit, makes the operatiing system distrustful and result in terrorble safe hidden troubles. A intact kernel Rootkit model is established which is detected by static analysis and a universal Rootkit behavior definition which sufficient and essentia are provedl. The symbolic execution static state analyse is adopted, make use of tainting mechanism, optimize the analyse process relying on the characteristic of the model, The kernel Rootkit detection based on the model has good veracity and fine forecast.
Keywords:Windows
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号