[1]李鹏 王汝传.内核入侵隐藏技术的研究与实现[J].计算机技术与发展,2011,(03):170-173.
 LI Peng,WANG Ru-chuan.Research and Realization of Concealment Technology Based on Kernel Hacking[J].,2011,(03):170-173.
点击复制

内核入侵隐藏技术的研究与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年03期
页码:
170-173
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research and Realization of Concealment Technology Based on Kernel Hacking
文章编号:
1673-629X(2011)03-0170-04
作者:
李鹏 王汝传
南京邮电大学计算机学院
Author(s):
LI Peng WANG Ru-chuan
College of Computer, Nanjing University of Posts and Teleconununications
关键词:
内核入侵信息隐藏进程隐藏网络安全
Keywords:
kernel concealment information hide process hide network security
分类号:
TP393.08
文献标志码:
A
摘要:
对不支持可加载模块的系统内核入侵代码隐藏技术进行了研究。比较了内核支持可加载模块和内核不支持可加载模块的内核入侵的方法区别,阐述了内核入侵在求解系统调用表的地址、kmalloc函数的地址、编写函数分配内核空间内存、编写入侵代码、汇编代码处理、提取代码段及重定位信息、分配内核空间的内存、代码写入分配的内存等八个主要流程。在总结入侵代码隐藏技术原理的基础上,给出了入侵代码隐藏文件信息、进程信息和网络连接技术的详细设计实现
Abstract:
Makes research on code concealment technology based on kernel hacking module without loadable kernel. It firstly analyzes the difference in kernel hacking method between module with loadable kernel and module without loadable kernel. Then, it expatiates the eight main steps of kernel hacking, which includes computing the address of system call table, calculating the address of kmalloc function, programming kernel space memory assignment function, implementing invasion codes, processing assembly code, extracting code segments and relocation information, assigning kernel space memory, and writing assigned memory. Based on summarizing the concealment technical principles of kernel hacking codes, finally designs and implements the kernel hacking technologies, which includes concealing file information, process information and network connections

相似文献/References:

[1]李兵兵 王衍波 徐敏 周杰.一种Word 2007中可无源检测的信息隐藏方法[J].计算机技术与发展,2010,(05):154.
 LI Bing-bing,WANG Yan-bo,XU Min,et al.An Information Hiding Method with "Blind" Detection Based on Word 2007[J].,2010,(03):154.
[2]吕建勋 贾世杰.基于图像的数字水印技术[J].计算机技术与发展,2009,(02):173.
 LU Jian-xun,JIA Shi-jie.Digital Watermark Technologies Based on Images[J].,2009,(03):173.
[3]朴红吉 郑品 田雄 冯林.基于线性预测和位操作的信息隐藏算法[J].计算机技术与发展,2008,(01):185.
 PIAO Hong-ji,ZHENG Pin,TIAN Xiong,et al.Data Hiding Algorithm Based on Linear- Prediction and Bit - Operation[J].,2008,(03):185.
[4]由守杰 柏森 曾辉[].鲁棒的混合域音频信息隐藏算法[J].计算机技术与发展,2008,(03):169.
 YOU Shou-jie,BAI Sen,ZENG Hui.Robust Audio Information Hiding Algorithm Based on DWT and DCT[J].,2008,(03):169.
[5]陆绿 方勇.基于字符Unicode奇偶性的数字水印设计与实现[J].计算机技术与发展,2010,(08):176.
 LU Lu,FANG Yong.Design and Implementation of Digital Watermark Based on Parity of Unicode[J].,2010,(03):176.
[6]刘红军 徐汀荣.基于区域的图像信息隐藏算法[J].计算机技术与发展,2007,(09):116.
 LIU Hong-jun,XU Ting-rong.Information Hiding Algorithm for Image Based on Section[J].,2007,(03):116.
[7]陈芳 王冰.基于文本字体的信息隐藏算法[J].计算机技术与发展,2006,(01):20.
 CHEN Fang,WANG Bing.An Algorithm of Text Information Hiding Based on Font[J].,2006,(03):20.
[8]周化灵 陈春玲.基于N阶Bézier曲线的多信息隐藏算法研究[J].计算机技术与发展,2006,(05):85.
 ZHOU Hua-ling,CHEN Chun-ling.Research on Multi- Information Concealment Algorithm Based on N -Bézier Curve[J].,2006,(03):85.
[9]商金婷 侯德文.基于策略模式的信息隐藏处理的软构件[J].计算机技术与发展,2006,(07):132.
 SHANG Jin-ting,HOU De-wen.A Soft Component of Information Hiding Based on Strategy Model[J].,2006,(03):132.
[10]李向辉 钟诚.提高Word文本文档信息隐藏容量的方法研究[J].计算机技术与发展,2006,(09):97.
 LI Xiang-hui,ZHONG Cheng.Research on Improving Capacity for Word Information Hiding Text Document[J].,2006,(03):97.

更新日期/Last Update: 1900-01-01