MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
碩士 === 大同大學 === 通訊工程研究所 === 94 === Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/53778078854660584970 |
id |
ndltd-TW-095TTU01650001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095TTU016500012016-06-01T04:21:11Z http://ndltd.ncl.edu.tw/handle/53778078854660584970 MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE 基於電腦資安攻防之惡意程式研析與實作 Kaimin Lu 呂開明 碩士 大同大學 通訊工程研究所 94 Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and the operating system. The system weakness for invasion are analyzed and the finding can be used to design more secure operation system. After the data collection and analysis, we build a Trojan program on the basis of the regular characteristics and test it against both the commercial antivirus softwares and firewalls. Chienhua Chen 陳建華 2006 學位論文 ; thesis 49 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 通訊工程研究所 === 94 === Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and the operating system. The system weakness for invasion are analyzed and the finding can be used to design more secure operation system. After the data collection and analysis, we build a Trojan program on the basis of the regular characteristics and test it against both the commercial antivirus softwares and firewalls.
|
author2 |
Chienhua Chen |
author_facet |
Chienhua Chen Kaimin Lu 呂開明 |
author |
Kaimin Lu 呂開明 |
spellingShingle |
Kaimin Lu 呂開明 MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE |
author_sort |
Kaimin Lu |
title |
MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE |
title_short |
MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE |
title_full |
MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE |
title_fullStr |
MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE |
title_full_unstemmed |
MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE |
title_sort |
malicious program analyzer and implemention based on the computer information security attack and defence |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/53778078854660584970 |
work_keys_str_mv |
AT kaiminlu maliciousprogramanalyzerandimplementionbasedonthecomputerinformationsecurityattackanddefence AT lǚkāimíng maliciousprogramanalyzerandimplementionbasedonthecomputerinformationsecurityattackanddefence AT kaiminlu jīyúdiànnǎozīāngōngfángzhīèyìchéngshìyánxīyǔshízuò AT lǚkāimíng jīyúdiànnǎozīāngōngfángzhīèyìchéngshìyánxīyǔshízuò |
_version_ |
1718289217837072384 |