A Study on Polymorphic Windows Kernel Mode Rootkit

碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === More and more malicious programs are combined with rootkits to shield their illegal activities and the result makes security products face a challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through...

Full description

Bibliographic Details
Main Authors: Yuh-Chen Chen, 陳昱成
Other Authors: Woei-Jiunn Tsaur
Format: Others
Language:en_US
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/92312229637569799284
id ndltd-TW-096DYU00396040
record_format oai_dc
spelling ndltd-TW-096DYU003960402015-11-30T04:02:36Z http://ndltd.ncl.edu.tw/handle/92312229637569799284 A Study on Polymorphic Windows Kernel Mode Rootkit 變形的WindowsKernelModeRootkit分析研究 Yuh-Chen Chen 陳昱成 碩士 大葉大學 資訊管理學系碩士班 96 More and more malicious programs are combined with rootkits to shield their illegal activities and the result makes security products face a challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel. Therefore, the role of a detector for detecting Windows driver-hidden rootkits is becoming extremely important. In this thesis, we first develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation, and have verified that it can successfully avoid well-known rootkit detectors. And we then propose a countermeasure to detect it. We affirm our efforts will be extremely useful for improving the current techniques of detecting Windows driver-hidden rootkits. Woei-Jiunn Tsaur 曹偉駿 2008 學位論文 ; thesis 45 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === More and more malicious programs are combined with rootkits to shield their illegal activities and the result makes security products face a challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel. Therefore, the role of a detector for detecting Windows driver-hidden rootkits is becoming extremely important. In this thesis, we first develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation, and have verified that it can successfully avoid well-known rootkit detectors. And we then propose a countermeasure to detect it. We affirm our efforts will be extremely useful for improving the current techniques of detecting Windows driver-hidden rootkits.
author2 Woei-Jiunn Tsaur
author_facet Woei-Jiunn Tsaur
Yuh-Chen Chen
陳昱成
author Yuh-Chen Chen
陳昱成
spellingShingle Yuh-Chen Chen
陳昱成
A Study on Polymorphic Windows Kernel Mode Rootkit
author_sort Yuh-Chen Chen
title A Study on Polymorphic Windows Kernel Mode Rootkit
title_short A Study on Polymorphic Windows Kernel Mode Rootkit
title_full A Study on Polymorphic Windows Kernel Mode Rootkit
title_fullStr A Study on Polymorphic Windows Kernel Mode Rootkit
title_full_unstemmed A Study on Polymorphic Windows Kernel Mode Rootkit
title_sort study on polymorphic windows kernel mode rootkit
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/92312229637569799284
work_keys_str_mv AT yuhchenchen astudyonpolymorphicwindowskernelmoderootkit
AT chényùchéng astudyonpolymorphicwindowskernelmoderootkit
AT yuhchenchen biànxíngdewindowskernelmoderootkitfēnxīyánjiū
AT chényùchéng biànxíngdewindowskernelmoderootkitfēnxīyánjiū
AT yuhchenchen studyonpolymorphicwindowskernelmoderootkit
AT chényùchéng studyonpolymorphicwindowskernelmoderootkit
_version_ 1718139524907794432