易再尧, 黄本雄, 孙建华. 一种基于虚拟化哈佛体系结构的Rootkit技术[J]. 微电子学与计算机, 2010, 27(4): 129-132,136.
引用本文: 易再尧, 黄本雄, 孙建华. 一种基于虚拟化哈佛体系结构的Rootkit技术[J]. 微电子学与计算机, 2010, 27(4): 129-132,136.
YI Zai-yao, HUANG Ben-xiong, SUN Jian-hua. A Rootkit Based on Virtualized Harvard Architectural[J]. Microelectronics & Computer, 2010, 27(4): 129-132,136.
Citation: YI Zai-yao, HUANG Ben-xiong, SUN Jian-hua. A Rootkit Based on Virtualized Harvard Architectural[J]. Microelectronics & Computer, 2010, 27(4): 129-132,136.

一种基于虚拟化哈佛体系结构的Rootkit技术

A Rootkit Based on Virtualized Harvard Architectural

  • 摘要: 通过修改操作系统内核的方式实现了哈佛内存体系结构的虚拟化, 在操作系统层分离了对Rootkit代码的取指和数据操作, 从而可以绕开内存扫描程序, 实现攻击代码的隐藏.文中详细讨论了虚拟化哈佛体系结构的具体实现, 并分析了它的有效性和对操作系统各个方面的影响.实验表明:该方法能很好地隐藏攻击代码, 对操作系统的正常工作影响十分轻微.

     

    Abstract: In this paper, the virtualization of Harvard memory architecture is implemented as a patch to the current operation system to separate the code fetch and the data operation of the rootkit code, and avoid being detecting by memory scanners to hide the attack code. The implementation of our virtualization is described in detail and its effectiveness to resist attacks and impact on the current operating system are fully analyzed. The experiment results show our approach is effective, has no side effect on the normal functions of the operation system.

     

/

返回文章
返回