Title :
Research and practice on the cooperative concealing technology of Trojan horses
Author :
Ren, Yongchang ; Xing, Tao ; Cao, Guanghui ; Xu, E. ; Chen, Xiaoji
Author_Institution :
Coll. of Inf. Sci. & Eng., Bohai Univ., Jinzhou, China
Abstract :
Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.
Keywords :
invasive software; Trojan horse hiding technology; cooperative concealing technology; threading model; windows systems; cooperative concealment; cooperative extended model; four threads trojan horse model; trojan horse;
Conference_Titel :
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
Conference_Location :
Wenzhou
Print_ISBN :
978-1-4244-5162-3
DOI :
10.1109/ICNDS.2010.5479153