Title :
The research on rootkit for information system classified protection
Author :
Tian, Zhihong ; Wang, Bailing ; Zhou, Zixi ; Zhang, HongLi
Author_Institution :
Res. Center of Comput. Network & Inf. Security Technol., Harbin Inst. of Technol., Harbin, China
Abstract :
Base on the analysis of linux system execution path, rootkits are divided into two categories, rootkit based on system call hook and rootkit based on system exception hook. According to the different stages of system call, system call hook included preload library, simple sys_call_table hook, inline system call hook, patch system_call hook, Rootkit based on /dev/kmem and /dev/mem. System exception hook rootkits include two exception exploit, abuse debug registers and hijack linux page fault handler.
Keywords :
Linux; security of data; Linux system execution path; information system classified protection; inline system call hook; patch system_call hook; preload library; rootkit; simple sys_call_table hook; system exception hook; Hardware; Kernel; Libraries; Linux; Registers; linux; rootkit; system call; system exception;
Conference_Titel :
Computer Science and Service System (CSSS), 2011 International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4244-9762-1
DOI :
10.1109/CSSS.2011.5974667