期刊文献+

基于磁盘数据分析的Bootkit静态检测研究与实现

RESEARCH AND IMPLEMENTATION OF DISK DATA ANALYSIS-BASED STATIC BOOTKIT DETECTION
下载PDF
导出
摘要 Bootkit这种新型恶意代码通过感染磁盘的主引导记录(MBR)或卷引导记录(VBR)来获取执行权,从而将加载时间大大提前以使常规基于动态行为分析的安全软件都不能对其进行有效检测[1]。针对Bootkit检测这一难题提出一种新型静态检测方法,设计实现相关的MBR匹配算法,并针对国内外知名的Bootkit恶意代码样本进行实验。实验结果显示此方法可以有效检测出当今主流的Bootkit恶意代码,进而证明了静态检测思路的可行性。 Bootkit,a novel malicious code,grabs the right of execution by infecting MBR or VBR so that greatly advances the loading time thus disables the effective detection on it by the conventional security software based on dynamic behaviour analysis[1].We propose a novel static detection method in this paper aiming at such a difficulty of Bootkit detection,design and implement correlated MBR matching algo-rithm.Moreover,the experiment is carried out against the Bootkit malicious code sample well-known at home and abroad.Experimental re-sults show that this method can effectively detect today’s mainstream Bootkit malicious codes,and further proves the feasibility of static detec-tion idea.
出处 《计算机应用与软件》 CSCD 2015年第6期52-56,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61332010)
关键词 BOOTKIT 主引导记录卷引导记录 MBR 匹配检测算法 Bootkit Master boot record (MBR) Volume boot record (VBR) MBR matching detection algorithm
  • 相关文献

参考文献8

  • 1Li X,Wen Y,Huang M H,et al.An Overview of Bootkit Attacking Approaches[C]//Mobile Ad-hoc and Sensor Networks(MSN),2011Seventh International Conference on.IEEE,2011:428-431. 被引量:1
  • 2Russinovich M E,Solomon D A,Ionescu A.WindowsInternals,Part 2:Covering Windows Server2008 R2 and Windows 7[M].O'Reilly Media,Inc.,2012. 被引量:1
  • 3Rodionov E,Matrosov A,Harley D.Bootkit Threat Evolution in 2011[EB/OL].http://blog.eset.com/2012/01/03/bootkit-threat-evolution-in-2011-2. 被引量:1
  • 4Zhu Y,Liu S L,Lu H,et al.Research on the detection technique of Bootkit[C]//2012 International Conference on Graphic and Image Processing.International Society for Optics and Photonics,2013:876860-876860-7. 被引量:1
  • 5朱瑜,刘胜利,陈嘉勇,高洪博.针对插入攻击型Bootkit的分析及检测[J].小型微型计算机系统,2012,33(7):1462-1467. 被引量:2
  • 6张勐,杨大全,辛义忠,赵德平.计算机病毒变形技术研究[J].沈阳工业大学学报,2004,26(3):309-312. 被引量:14
  • 7蓝维洲..BGP协议中正则表达式匹配系统的研究与软硬件实现[D].上海交通大学,2010:
  • 8Faruki P,Laxmi V,Gaur M S,et al.Behavioural detection with API call-grams to identify malicious PE files[C]//Proceedings of the First International Conference on Security of Internet of Things.ACM,2012:85-91. 被引量:1

二级参考文献13

  • 1李冰.关于主动防治计算机病毒的几点探讨[J].中央民族大学学报(自然科学版),2001,10(2):170-174. 被引量:9
  • 2Cadar C, Genesh V, Pawlowski P M, et al. EXE: automatically generating inputs of death [ J ]. ACM Transactions on Information and System Security,2008,12 (2) : 1-38. 被引量:1
  • 3Greg Hoglund, James Butler. Rootkits: subvering the Windows kernel[ M]. New Jersey: Addison-Wesley, 2006. 被引量:1
  • 4Samuel T, Chen Peter M, Verbowski Chad, et al. SubVirt: imple- menting malware with virtual machines[ C]. Proceedings of IEEE Symposium on Security and Privacy, 2006:314-327. 被引量:1
  • 5Zhu Yu, Liu Sheng-li, Lu Hong-hu, et al. Research on the detec- tion technique of bootldt [ C ]. Proceedings of 2010 3rd Internation- al Conference on Computer and Electrical Engineering, Chengdu: IEEE, 2010,10:531-535. 被引量:1
  • 6Derek S, Ryan P. eEye BootRoot[EB/OL]. http://www, black- hat. corrt/presentations/bh-usa-05/bh-us-05-soeder, pdf, 2005. 被引量:1
  • 7IceLord. BIOS RootKit: welcome home, my lord! [ EB/OL ]. http ://www. xfocus, net/articles/200705/918, html, 2007-05-11. 被引量:1
  • 8刘龙.WindowsVista下可持续控制技术研究[D].信息工程大学,2009. 被引量:1
  • 9Stoned bootkit [ EB/OL ]. http://www, stone.d-vienna, corn/, 2010-10-07. 被引量:1
  • 10Thimbleby H, Anderson S, Cairns P. A framework for modelling trojans and computer virus infection [ J ]. The Computer Journal, 1998,41 (7) :444-458. 被引量:1

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部