期刊文献+

远程线程注入技术在监控系统中的应用 被引量:3

Application of Remote-Thread Injection Technique on Monitor System
下载PDF
导出
摘要 监控系统要求具有实时性和隐藏性,远程线程注入技术能实现在Windows系统下进程的隐藏。将监控程序编译成动态链接库(DLL)文件,采用远程线程注入技术注入到系统进程运行,能有效地提高监控系统的安全性能。本文介绍了远程线程注入技术的原理,分析了基于远程线程注入的监控系统的关键技术和实现方法,通过设置定时器的方法解决了系统实时性需求,通过给出的远程线程注入技术解决了隐藏性需求。最后分析采用两级监控和应对安全检测技术来提高监控系统的安全性。 The monitor system demands a characteristic of real time and hiding. The process can be hidden by remote - thread injection technique in Windows system. The monitor program is compiled to DLL and injected into system process to run. In this way, the safety of monitor system can be enhanced effectively. The theory of remote - thread injection technique is presented in this paper. The main technique and implementation method of monitor system based on remote- thread injection technique is analyzed, by setting timer to solve the demands of system' s real time, through the remote - thread injection technique to solve the demands of hiding. At last, the two- stage monitor technique and the responding to safety detection technique are discussed to improving the safety of monitor system.
作者 王峥 娄渊胜
出处 《计算机技术与发展》 2010年第3期207-210,共4页 Computer Technology and Development
基金 国家高技术(863)计划项目(2007AA01Z179)
关键词 远程线程注入 监控系统 进程隐藏 动态链接库 remote-thread injection monitor system hidden process DLL
  • 相关文献

参考文献9

二级参考文献21

  • 1JeffreyRichter.Windows核心编程[M].北京:机械工业出版社,2000.. 被引量:21
  • 2约翰·艾而斯,著.Delphi WinS2核心API参考[M].陈锐,译.北京:中国电力出版社,2004,3. 被引量:1
  • 3王建华,张焕生,侯丽坤.Windows核心编程[M].北京:机械工业出版社,2001. 被引量:4
  • 4雷校勇,黄小平.Windows RootKit技术原理及防御策略[D].上海:上海交通大学,2006. 被引量:2
  • 5BUTELER J R I L. Detecting compromises of core subsystems and kernel function in Windows NT/2000/XP: M. S. Thesis[ D]. Baltimore County: University of Maryland, 2002. 被引量:1
  • 6DOROTHY E. Denning, information warfare and security[ M]. Boston: Addison Wesley, 2001. 被引量:1
  • 7齐琪.Windows下EPA技术的研究与改进[D].武汉:华中科技大学,2006. 被引量:1
  • 8BUTLER J, JEFFREY L, PINKSON J. Hidden processes: The implication for intrusion detection[ C]//Proceedings of the 2003 IEEE Workshop on Assurance United States Military Academy. West Point: IEEE Press, 2003. 被引量:1
  • 9LEVINE J G, GRIZZARD J B, HUTTO P W, et al. A methodology to characterize kernel level rootkit exploits that overwrite the system call table[ C]// Proceeding of IEEE SoutheastCon. Washington: IEEE Press, 2004:25 - 31. 被引量:1
  • 10GREG H, JAMES B. RootKit: Subverting the Windows kernel[ M]. Boston: Addison Wesley, 2005. 被引量:1

共引文献19

同被引文献21

  • 1南理勇,左强.可移动存储设备的识别[J].计算机与数字工程,2005,33(9):131-133. 被引量:6
  • 2刘克胜,王忠寿.API Hook关键技术解析[J].网络安全技术与应用,2006(11):48-50. 被引量:10
  • 3倪步喜.Windows的钩子技术及实现[J].计算机与现代化,2007(1):28-30. 被引量:11
  • 4Jones R, Lins R. Garbage Collection:Algorithms for Automatic Dynamic Memory Management [ M ]. [ s. l. ] : John Wiley & Sons, 1996. 被引量:1
  • 5Boehm H J, Weiser M. Garbage collection in an uncooperative environment[J]. Software Practice and Experience, 1988,18 (9) :807-820. 被引量:1
  • 6Wentworth E P. Pitfalls of conservative garbage collection[J]. Software Practice and Experience, 1990,20 ( 7 ) :719-727. 被引量:1
  • 7Willard B, Frieder O. Autonomous garbage collection: resolving memory leaks in long- running server applications [ J ]. Computer Communications ,2000,23 (10) :887-900. 被引量:1
  • 8Horowitz E, Sahni S, Anderson-Freed S, et al.数据结构(C语言版)[M].李建中,译.北京:机械工业出版社,2006. 被引量:1
  • 9Michael G. Easy Detection of Memory Leaks[EB/OL]. 2005- 08 - 04 [2011 - 04 - 26]. http ://www. codeproject. com/KB/cpp/MemoryHooks. aspx. 被引量:1
  • 10杰夫瑞,克里斯托夫.Windows核心编程[M].葛子昂,周靖,廖敏,译.北京:清华大学出版社,2008. 被引量:2

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部