MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE

碩士 === 大同大學 === 通訊工程研究所 === 94 === Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and...

Full description

Bibliographic Details
Main Authors: Kaimin Lu, 呂開明
Other Authors: Chienhua Chen
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/53778078854660584970
id ndltd-TW-095TTU01650001
record_format oai_dc
spelling ndltd-TW-095TTU016500012016-06-01T04:21:11Z http://ndltd.ncl.edu.tw/handle/53778078854660584970 MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE 基於電腦資安攻防之惡意程式研析與實作 Kaimin Lu 呂開明 碩士 大同大學 通訊工程研究所 94 Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and the operating system. The system weakness for invasion are analyzed and the finding can be used to design more secure operation system. After the data collection and analysis, we build a Trojan program on the basis of the regular characteristics and test it against both the commercial antivirus softwares and firewalls. Chienhua Chen 陳建華 2006 學位論文 ; thesis 49 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 大同大學 === 通訊工程研究所 === 94 === Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and the operating system. The system weakness for invasion are analyzed and the finding can be used to design more secure operation system. After the data collection and analysis, we build a Trojan program on the basis of the regular characteristics and test it against both the commercial antivirus softwares and firewalls.
author2 Chienhua Chen
author_facet Chienhua Chen
Kaimin Lu
呂開明
author Kaimin Lu
呂開明
spellingShingle Kaimin Lu
呂開明
MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
author_sort Kaimin Lu
title MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
title_short MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
title_full MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
title_fullStr MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
title_full_unstemmed MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
title_sort malicious program analyzer and implemention based on the computer information security attack and defence
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/53778078854660584970
work_keys_str_mv AT kaiminlu maliciousprogramanalyzerandimplementionbasedonthecomputerinformationsecurityattackanddefence
AT lǚkāimíng maliciousprogramanalyzerandimplementionbasedonthecomputerinformationsecurityattackanddefence
AT kaiminlu jīyúdiànnǎozīāngōngfángzhīèyìchéngshìyánxīyǔshízuò
AT lǚkāimíng jīyúdiànnǎozīāngōngfángzhīèyìchéngshìyánxīyǔshízuò
_version_ 1718289217837072384