rootkit

  • 网络木马;恶意软件;后门
rootkitrootkit
  1. The kernel-level rootkit is an import technology for hackers to open backdoor after intruding systems successfully .

    内核级木马是黑客入侵系统后保留后门的重要技术。

  2. Research and Application of Kernel Rootkit Detection Technology under Win32 Environment

    Win32平台下内核Rootkit检测技术的研究与应用

  3. And we design a Windows RootKit Monitoring System in according to the security strategy .

    本文按照制定的安全策略实现方案,设计了一个WindowsRootKit的监测系统。

  4. A New Methodology of Detecting System Level rootkit

    检测内核级rootkit的新方法

  5. A Method to Automatically Detect and Recover from Kernel Level Rootkit

    一种自动检测内核级Rootkit并恢复系统的方法

  6. The Research and Application on Linux Kernel-level Rootkit Detection Methods

    Linux内核级Rootkit检测方法的研究与应用

  7. Finally , to design a new dynamic kernel-level rootkit .

    最后,设计出了一种新型的动态的内核级rootkit。

  8. Concealing Technology of Windows Rootkit and Integrated Detection Method

    WindowsRootKit隐藏技术与综合检测方法

  9. Synthetic approach for Windows Rootkit analysis and detection

    WindowsRootKit分析与检测综合方法

  10. The kernel Rootkit detection based on the model has good veracity and fine forecast .

    基于这个模型的内核级Rootkit检测具有高准确性和较好的前瞻性。

  11. Detection of Trojan Horse Based on Rootkit Technology

    面向Rootkit技术的木马检测方法研究

  12. Rootkit was first designed to implement in UNIX system , then gradually developed to the other operating systems .

    Rootkit技术最先被发明应用于UNIX系统中,随后逐步发展到其他操作系统平台上。

  13. Rootkit which provides concealment function for malware is a common technique used in various attacks .

    Rootkit技术是各种攻击中通常采用的技术,它为恶意软件提供了隐藏行迹的功能。

  14. By analyzing the core of the current level rootkit and in accordance with its technology used to their classification .

    通过分析当前的内核级rootkit并根据其采用的技术将其分类。

  15. Kernel Mode Rootkit is one class of the best hidden and the most difficult detected malicious .

    内核态Rootkit是恶意代码中隐藏性最好,最难以检测的一类恶意代码。

  16. Rootkit Detection Technique Based on NTFS Disk Parse

    基于NTFS磁盘解析的Rootkit检测技术

  17. The detection and protection module is responsible for detecting the Rootkit and protecting the target OS .

    检测和保护模块对目标操作系统进行检测和保护。

  18. Windows Rootkit Detection Method Based on Cross-view

    一种基于交叉视图的WindowsRootKit检测方法

  19. Therefore , we study the latest network card Rootkit techniques to understand how to detect the hardware Rootkit .

    因此,本文主要研究最新基于硬件网卡的Rootkit隐蔽技术,从而了解如何对硬件Rootkit进行检测与防护。

  20. Concealment module is achieved by kernel Rootkit while user expecting function module is accomplished in user level .

    负责隐藏整个木马的隐藏模块采用内核级Rootkit技术实现,而具体完成用户期望功能的模块则是在用户层来实现。

  21. New method of detecting kernel-level Rootkit

    一种新的内核级Rootkit的检测方法

  22. Rootkit techniques to hide processes , files , TCP port , such as the registry .

    Rootkit技术可隐藏进程、文件、TCP端口、注册表等。

  23. In order to check all kinds of Windows rootkit efficiently and completely , we put forward memory integrality check method .

    提出了一种内存完整性检测方法,以全面、有效地检测各种现有的WindowsRootKit。

  24. In more complex situations , a rootkit may be dropped off and in turn used to launch an attack .

    在更复杂的情况下,rootkit可能用于启动攻击。

  25. Based on the memory integrality check method , we design a new Windows rootkit check tool . All technic details is presented .

    根据此方法,本文给出了一个完整的WindowsRootKit检测工具设计方案,并详细讲述了具体的实现细节。

  26. Accordingly , the Rootkit detection technology has been developing several years , however they are deficient in general usage and self-protection .

    相应的,Rootkit检测技术也不断的发展,但在通用性和自保护方面存在不足。

  27. As a new kind of malware sets , Rootkit has been designed to control the behavior of hijacked computer secretly .

    Rootkit是一种新型的恶意程序程序或程序集,设计的目的是用来秘密的控制被攻占的计算机的行为。

  28. Rootkit can conceal itself and other specified resources or actions , thus it may harm the system security without being aware of .

    Rootkit能够隐藏自身及系统中特定资源和活动,从而危害系统安全而不易被觉察。

  29. And with the rapid development of cloud computing services , the kernel mode Rootkit has became an important threat in the cloud computing center .

    而随着云计算服务的快速发展,内核态Rootkit更成为了云计算中的一个重要威胁。

  30. Detecting kernel-level Rootkit based on filesystem anomalies

    基于文件系统异常的内核级Rootkit检测