“In-VM”模型的隐藏代码检测模型(英文)

来源 :中国通信 | 被引量 : 0次 | 上传用户:seanchn
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on “In-VM” idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss. Security tools are rapidly developed as network security threat is becoming more and more serious. To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes, VMM-based anti-malware systems have recently became a hot research field. In this article, the existing malware hiding technique is analyzed and a detecting model for hidden process based on “In-VM” idea is also proposed. Based on this detecting model, a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully. This technology can guarantee the detection method not to be attacked by malwares and also resist all the current process hiding technologies. In order to detect the malwares which use remote injection method to hide themselves, a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines, can detect all malware samples, and just bring little performance loss.
其他文献
书名:《我睡沙发去旅行》类型:游记作者:龙泓全出版日期:2012年1月定价:32.00元出版社:江苏人民出版社推荐理由Leo是一个平凡的年轻人,为了给自己时间和空间,想清楚自己究竟
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
《考试》杂志是光明日报主管、主办的中央级教辅刊物,其办刊宗旨为“研究考试、指导复习、服务师生、提高能力”。1993年1月,《考试》杂志正式创刊。创刊18年来,《考式》杂志
考点透视1.朗读节奏。主要有两种考查形式:一是选出用“/”断句正确或错误的一项;二是按要求用“/”给句子断句(通常提示断为几处)。2.实词和虚词。实词主要是教材中出现的通
【2012年安徽高考作文题展示】阅读下面的材料,根据要求写一篇不少于800字的文章。某公司车间角落放置了一架工作使用的梯子。为了防止梯子倒下伤着人,工作人员特意在旁边写
学霸名片  姓名:张铖  爱好:旅行、跑步、羽毛球  毕业计划:一直想着成为一位科研人员,所以毕业后打算继续攻读硕士研究生。  理想宣言:永远不要说自己不行,向着心中的梦想勇敢前行。  高考寄语:2015年盛夏属于你们,期待你们的精彩表现。  大多数人会因为大千世界的色彩纷呈、绚丽多姿而爱上生物,但我却为她所蕴含的无穷奥秘所深深吸引。杂交水稻、克隆羊、转基因棉花等利用生物学创造出的人工奇迹,更是令
2011年9月9日,由诗刊社、大众文艺出版社、北京杰威国际共同主办的孙毓霜诗歌新作《三秋集》出版座谈会在北京中国现代文学馆举行。来自文艺界的有关领导、诗人、评论家李文
胡锦涛总书记在庆祝中国共产党成立90周年纪念大会上的重要讲话,以马克思列宁主义、毛泽东思想、邓小平理论和“三个代表”重要思想为指导,深入贯彻落实科学发展观,坚持解放
嘉宾简介:杜萍,2002年毕业于兰州大学大气科学系,获博士学位,随后赴加拿大继续博士后工作,现就职于加拿大国家气象局。  和平常一样,我准时来到办公室,打开电脑,开始新一天的工作。  上午,我要把“观测资料误差对天气预报的影响”这个方法写入计算机程序,并编译这个程序,使其正常运行,然后用其他软件分析运行结果,通过分析结果决定是否需要调整程序。“观测资料误差对天气预报的影响”是我最近完成的课题。下午
空间想象能力