STEALTH: A Method of Hiding and Encrypting Files in NTFS
碩士 === 國立中央大學 === 資訊工程學系 === 101 === A rootkit can hide any information such as the files, processes, drivers, and network connections on your computer. With development of operating system, Rootkits have many hidden methods such as the traditional hooking or DKOM (Direct Kernel Object Manipulation)...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/957w2a |
id |
ndltd-TW-101NCU05392082 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NCU053920822019-10-24T05:18:58Z http://ndltd.ncl.edu.tw/handle/957w2a STEALTH: A Method of Hiding and Encrypting Files in NTFS Syun-cheng Ou 歐巡丞 碩士 國立中央大學 資訊工程學系 101 A rootkit can hide any information such as the files, processes, drivers, and network connections on your computer. With development of operating system, Rootkits have many hidden methods such as the traditional hooking or DKOM (Direct Kernel Object Manipulation). It is difficult to detect DKOM because DKOM only modifies the data structure of the kernel and does not change any program or code. Because not all files on the computer are loaded into memory, DKOM cannot only manipulate data structures of the kernel to hide any file. In this paper, we proposed a new hidden method that modify some information of NTFS (New Technology File System). The method is not like the traditional hooking which is detected by anti-virus software easily. According to our experiments, anti-virus software cannot detect the virus file which is hidden by our system. We want to strengthen the confidentiality of the hidden files. In addition to hide file, our system encrypts the file. We did experiments with data recovery software. The data recovery software can restore the file which is deleted, name broken, size damage and so on. But according to our experiments, data recover software can not restore our encrypted files. Applications cannot read data of files until the files is decrypted by our system. Fu-hau Hsu 許富皓 2013 學位論文 ; thesis 45 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程學系 === 101 === A rootkit can hide any information such as the files, processes, drivers, and network connections on your computer. With development of operating system, Rootkits have many hidden methods such as the traditional hooking or DKOM (Direct Kernel Object Manipulation). It is difficult to detect DKOM because DKOM only modifies the data structure of the kernel and does not change any program or code.
Because not all files on the computer are loaded into memory, DKOM cannot only manipulate data structures of the kernel to hide any file. In this paper, we proposed a new hidden method that modify some information of NTFS (New Technology File System). The method is not like the traditional hooking which is detected by anti-virus software easily. According to our experiments, anti-virus software cannot detect the virus file which is hidden by our system.
We want to strengthen the confidentiality of the hidden files. In addition to hide file, our system encrypts the file. We did experiments with data recovery software. The data recovery software can restore the file which is deleted, name broken, size damage and so on. But according to our experiments, data recover software can not restore our encrypted files. Applications cannot read data of files until the files is decrypted by our system.
|
author2 |
Fu-hau Hsu |
author_facet |
Fu-hau Hsu Syun-cheng Ou 歐巡丞 |
author |
Syun-cheng Ou 歐巡丞 |
spellingShingle |
Syun-cheng Ou 歐巡丞 STEALTH: A Method of Hiding and Encrypting Files in NTFS |
author_sort |
Syun-cheng Ou |
title |
STEALTH: A Method of Hiding and Encrypting Files in NTFS |
title_short |
STEALTH: A Method of Hiding and Encrypting Files in NTFS |
title_full |
STEALTH: A Method of Hiding and Encrypting Files in NTFS |
title_fullStr |
STEALTH: A Method of Hiding and Encrypting Files in NTFS |
title_full_unstemmed |
STEALTH: A Method of Hiding and Encrypting Files in NTFS |
title_sort |
stealth: a method of hiding and encrypting files in ntfs |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/957w2a |
work_keys_str_mv |
AT syunchengou stealthamethodofhidingandencryptingfilesinntfs AT ōuxúnchéng stealthamethodofhidingandencryptingfilesinntfs |
_version_ |
1719276595361873920 |