An Effective Scheme for Protecting against Windows Kernel-mode Rootkits
碩士 === 大葉大學 === 資訊管理學系碩士班 === 98 === More and more malicious programs are combined with rootkits to shield their illegal activities so that result makes information security defense encounters a great challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execu...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/12058051180668887068 |
id |
ndltd-TW-098DYU00396024 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098DYU003960242015-10-13T18:16:15Z http://ndltd.ncl.edu.tw/handle/12058051180668887068 An Effective Scheme for Protecting against Windows Kernel-mode Rootkits 有效的Windows核心模式Rootkits惡意軟體防禦機制 SHI-JIA Lin 林士嘉 碩士 大葉大學 資訊管理學系碩士班 98 More and more malicious programs are combined with rootkits to shield their illegal activities so that result makes information security defense encounters a great challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel.In the current prevention schemes, the memory shadowing, kernel-mode code signing walkthrough and host-based intrusion prevention system are all to passively protect the operating systems, and they cannot identify whether rootkits intrude in the operating systems. On the other hand, though many companies or individuals have developed rootkit detectors to the public and undoubtedly they can detect known rootkits effectively, they cannot foresee what the result is when meeting unknown rootkits and crashed operating systems. Hence, the thesis will develop a prevention mechanism which can identify driver-hidden rootkits to protect the Windows-based operating systems. Our research constructs an anti-rootkit scheme for protecting Windows kernel to higher system security, especially for safeguarding Windows kernel from the damages of unknown driver-hidden rootkits. Moreover, we also test the proposed prevention scheme by Windows XP SP3 on the Testbed@TWISC platform. We affirm that our efforts are extremely useful for improving the current techniques of preventing Windows driver-hidden rootkits. Woei-Jiunn Tsaur 曹偉駿 2010 學位論文 ; thesis 62 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大葉大學 === 資訊管理學系碩士班 === 98 === More and more malicious programs are combined with rootkits to shield their illegal activities so that result makes information security defense encounters a great challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel.In the current prevention schemes, the memory shadowing, kernel-mode code signing walkthrough and host-based intrusion prevention system are all to passively protect the operating systems, and they cannot identify whether rootkits intrude in the operating systems. On the other hand, though many companies or individuals have developed rootkit detectors to the public and undoubtedly they can detect known
rootkits effectively, they cannot foresee what the result is when meeting unknown rootkits and crashed operating systems. Hence, the thesis will develop a prevention mechanism which can identify driver-hidden rootkits to protect the Windows-based operating systems.
Our research constructs an anti-rootkit scheme for protecting Windows kernel to higher system security, especially for safeguarding Windows kernel from the damages of unknown driver-hidden rootkits. Moreover, we also test the proposed prevention
scheme by Windows XP SP3 on the Testbed@TWISC platform. We affirm that our efforts are extremely useful for improving the current techniques of preventing Windows driver-hidden rootkits.
|
author2 |
Woei-Jiunn Tsaur |
author_facet |
Woei-Jiunn Tsaur SHI-JIA Lin 林士嘉 |
author |
SHI-JIA Lin 林士嘉 |
spellingShingle |
SHI-JIA Lin 林士嘉 An Effective Scheme for Protecting against Windows Kernel-mode Rootkits |
author_sort |
SHI-JIA Lin |
title |
An Effective Scheme for Protecting against Windows Kernel-mode Rootkits |
title_short |
An Effective Scheme for Protecting against Windows Kernel-mode Rootkits |
title_full |
An Effective Scheme for Protecting against Windows Kernel-mode Rootkits |
title_fullStr |
An Effective Scheme for Protecting against Windows Kernel-mode Rootkits |
title_full_unstemmed |
An Effective Scheme for Protecting against Windows Kernel-mode Rootkits |
title_sort |
effective scheme for protecting against windows kernel-mode rootkits |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/12058051180668887068 |
work_keys_str_mv |
AT shijialin aneffectiveschemeforprotectingagainstwindowskernelmoderootkits AT línshìjiā aneffectiveschemeforprotectingagainstwindowskernelmoderootkits AT shijialin yǒuxiàodewindowshéxīnmóshìrootkitsèyìruǎntǐfángyùjīzhì AT línshìjiā yǒuxiàodewindowshéxīnmóshìrootkitsèyìruǎntǐfángyùjīzhì AT shijialin effectiveschemeforprotectingagainstwindowskernelmoderootkits AT línshìjiā effectiveschemeforprotectingagainstwindowskernelmoderootkits |
_version_ |
1718029149857120256 |