DocumentCode :
2572278
Title :
Research and practice on the cooperative concealing technology of Trojan horses
Author :
Ren, Yongchang ; Xing, Tao ; Cao, Guanghui ; Xu, E. ; Chen, Xiaoji
Author_Institution :
Coll. of Inf. Sci. & Eng., Bohai Univ., Jinzhou, China
Volume :
1
fYear :
2010
fDate :
30-31 May 2010
Firstpage :
216
Lastpage :
219
Abstract :
Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.
Keywords :
invasive software; Trojan horse hiding technology; cooperative concealing technology; threading model; windows systems; cooperative concealment; cooperative extended model; four threads trojan horse model; trojan horse;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
Conference_Location :
Wenzhou
Print_ISBN :
978-1-4244-5162-3
Type :
conf
DOI :
10.1109/ICNDS.2010.5479153
Filename :
5479153
Link To Document :
بازگشت